• DocumentCode
    2880376
  • Title

    A novel method for secure logging system call

  • Author

    Meng, JiangTao ; Lu, Xianliang ; Dong, GuiShan

  • Author_Institution
    Sch. of Comput., China Univ. of Electron. Sci. & Technol., Chengdu, China
  • Volume
    2
  • fYear
    2005
  • fDate
    12-14 Oct. 2005
  • Firstpage
    955
  • Lastpage
    958
  • Abstract
    Traditional methods of logging system activity are fundamentally insecure, which means that an attacker may compromise or tamper the logs. A novel method, Xen-based secure logging system call, is used to provide tamper-free logs of system call for some intrusion detection analysis techniques, which only require sequences of system call within a user process. Preliminary evaluation showed that the prototype is simple and efficient.
  • Keywords
    data loggers; security of data; virtual machines; Xen-based secure logging system call; intrusion detection analysis techniques; system call; tamper-free logs; Application software; Control systems; Hardware; Intrusion detection; Linux; Operating systems; Prototypes; Virtual machine monitors; Virtual machining; Virtual manufacturing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Information Technology, 2005. ISCIT 2005. IEEE International Symposium on
  • Print_ISBN
    0-7803-9538-7
  • Type

    conf

  • DOI
    10.1109/ISCIT.2005.1567025
  • Filename
    1567025