Study of log file dispersion management method

Fumiharu Etoh, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai

研究成果: Chapter in Book/Report/Conference proceedingConference contribution

2 被引用数 (Scopus)

抄録

In system equipment, a mechanism to prevent the manipulation or deletion of log information and log files by an attacker and to maintain the contents of log files are essential. Because log files include an active event and an operation event in the system equipment, these files are at risk of attacks such as file manipulation or deletion. In this paper, we propose a log file dispersion management method using hash values. It is possible to detect the manipulation or deletion of log information and log files and to reconstruct original log files. Further, this method has both redundancy and resistibility.

本文言語英語
ホスト出版物のタイトルProceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010
ページ371-374
ページ数4
DOI
出版ステータス出版済み - 11 29 2010
イベント2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 - Seoul, 大韓民国
継続期間: 7 19 20107 23 2010

出版物シリーズ

名前Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010

その他

その他2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010
国/地域大韓民国
CitySeoul
Period7/19/107/23/10

All Science Journal Classification (ASJC) codes

  • コンピュータ ネットワークおよび通信
  • コンピュータ サイエンスの応用

フィンガープリント

「Study of log file dispersion management method」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル