DocumentCode
2880376
Title
A novel method for secure logging system call
Author
Meng, JiangTao ; Lu, Xianliang ; Dong, GuiShan
Author_Institution
Sch. of Comput., China Univ. of Electron. Sci. & Technol., Chengdu, China
Volume
2
fYear
2005
fDate
12-14 Oct. 2005
Firstpage
955
Lastpage
958
Abstract
Traditional methods of logging system activity are fundamentally insecure, which means that an attacker may compromise or tamper the logs. A novel method, Xen-based secure logging system call, is used to provide tamper-free logs of system call for some intrusion detection analysis techniques, which only require sequences of system call within a user process. Preliminary evaluation showed that the prototype is simple and efficient.
Keywords
data loggers; security of data; virtual machines; Xen-based secure logging system call; intrusion detection analysis techniques; system call; tamper-free logs; Application software; Control systems; Hardware; Intrusion detection; Linux; Operating systems; Prototypes; Virtual machine monitors; Virtual machining; Virtual manufacturing;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications and Information Technology, 2005. ISCIT 2005. IEEE International Symposium on
Print_ISBN
0-7803-9538-7
Type
conf
DOI
10.1109/ISCIT.2005.1567025
Filename
1567025
Link To Document