Recovery Based Architecture To Protect Hids Log Files Using Time Stamps

dc.contributor.authorKhurana, Surinder Singh
dc.contributor.authorBansal, Divya
dc.contributor.authorSofat, Sanjeev
dc.date.accessioned2018-01-08T05:47:58Z
dc.date.accessioned2024-08-14T05:05:37Z
dc.date.available2018-01-08T05:47:58Z
dc.date.available2024-08-14T05:05:37Z
dc.date.issued2010
dc.description.abstractAfter the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions in technology, the threat of attacks through computer networks becomes a large issue. Host Based Intrusion Detection is a part of security system that protects hosts from various kinds of attacks. It also provides a great degree of visibility (of system activities). It is quite widest that HIDS are vulnerable to attacks. An adversary, if successfully enters in a system can disable HIDS or modify HIDS rules to hide its existence. One can easily evade HIDS. In [7] we propose a new architecture that protects HIDS from such attacks. In this paper, we have proposed a new mechanism to check integrity of log files. We have discussed its affects on performance of system.en_US
dc.identifier.citationKhurana, S.S., Bansal, Divya & Sofat, Sanjeev (2010) Recovery Based Architecture To Protect Hids Log Files Using Time Stamps., JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, doi:10.4304/jetwi.2.2. 110-114en_US
dc.identifier.issn17980461
dc.identifier.urihttps://kr.cup.edu.in/handle/32116/506
dc.language.isoen_USen_US
dc.publisherACADEMY PUBLISHERen_US
dc.titleRecovery Based Architecture To Protect Hids Log Files Using Time Stampsen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
5.pdf
Size:
337.3 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Plain Text
Description: