TY - GEN
T1 - A secure virtualized logging scheme for digital forensics in comparison with kernel module approach
AU - Chou, Bin Hui
AU - Tatara, Kohei
AU - Sakuraba, Taketoshi
AU - Hori, Yoshiaki
AU - Sakurai, Kouichi
PY - 2008
Y1 - 2008
N2 - Digital forensics encompasses the process of identifying the perpetrator and the criminal method by analyzing the logs generated in the computer. Log files record the activities of the computer and by reading them one can know what kind of event happened at a certain time. Therefore, secure logs with the integrity property are essential. In this paper, we discuss two approaches to achieve the integrity of logsthe kernel module and virtualization, and compare them. Although virtualization is more inefficient in performance than the kernel module, it provides more security properties for logs. Thus, we then focus on the virtualization approach with a detailed proposal, which describes ways to preserve logs without tampering and deletion.
AB - Digital forensics encompasses the process of identifying the perpetrator and the criminal method by analyzing the logs generated in the computer. Log files record the activities of the computer and by reading them one can know what kind of event happened at a certain time. Therefore, secure logs with the integrity property are essential. In this paper, we discuss two approaches to achieve the integrity of logsthe kernel module and virtualization, and compare them. Although virtualization is more inefficient in performance than the kernel module, it provides more security properties for logs. Thus, we then focus on the virtualization approach with a detailed proposal, which describes ways to preserve logs without tampering and deletion.
UR - http://www.scopus.com/inward/record.url?scp=51349084065&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51349084065&partnerID=8YFLogxK
U2 - 10.1109/ISA.2008.96
DO - 10.1109/ISA.2008.96
M3 - Conference contribution
AN - SCOPUS:51349084065
SN - 9780769531267
T3 - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
SP - 421
EP - 426
BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
T2 - 2nd International Conference on Information Security and Assurance, ISA 2008
Y2 - 24 April 2008 through 26 April 2008
ER -