• DocumentCode
    160461
  • Title

    Comparison of File Integrity Monitoring (FIM) techniques for small business networks

  • Author

    Wilbert, Brittany ; Lei Chen

  • Author_Institution
    Dept. of Comput. Sci., Sam Houston State Univ., Huntsville, TX, USA
  • fYear
    2014
  • fDate
    11-13 July 2014
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    File Integrity Monitoring (FIM) can provide the ability to track changes which have been made to an operating system or software as a result of malicious behavior. For small business environments, the need for these tools is present; however, because of the difficulty of managing such software many businesses may ignore using them. This paper will discuss how a small business should create criteria for comparing file integrity monitoring tools in order to locate the most effective product for their environment.
  • Keywords
    business data processing; file organisation; operating systems (computers); system monitoring; FIM; file integrity monitoring techniques; file integrity monitoring tools; malicious behavior; operating system; small business environments; small business networks; Business; Kernel; Monitoring; Security; Virtual machining; auditing; log file integrity monitoring; log management; small business environments;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on
  • Conference_Location
    Hefei
  • Print_ISBN
    978-1-4799-2695-4
  • Type

    conf

  • DOI
    10.1109/ICCCNT.2014.6963090
  • Filename
    6963090