• DocumentCode
    3371948
  • Title

    A Secure Virtualized Logging Scheme for Digital Forensics in Comparison with Kernel Module Approach

  • Author

    Chou, Bin-Hui ; Tatara, Kohei ; Sakuraba, Taketoshi ; Hori, Yoshiaki ; Sakurai, Kouichi

  • Author_Institution
    Grad. Inst. of Inf. Sci. & Electr. Eng., Kyushu Univ., Fukuoka
  • fYear
    2008
  • fDate
    24-26 April 2008
  • Firstpage
    421
  • Lastpage
    426
  • Abstract
    Digital forensics encompasses the process of identifying the perpetrator and the criminal method by analyzing the logs generated in the computer. Log files record the activities of the computer and by reading them one can know what kind of event happened at a certain time. Therefore, secure logs with the integrity property are essential. In this paper, we discuss two approaches to achieve the integrity of logs- the kernel module and virtualization, and compare them. Although virtualization is more inefficient in performance than the kernel module, it provides more security properties for logs. Thus, we then focus on the virtualization approach with a detailed proposal, which describes ways to preserve logs without tampering and deletion.
  • Keywords
    computer crime; security of data; system monitoring; Log files; criminal method; digital forensics; integrity property; kernel module approach; perpetrator; virtualized logging scheme; Digital forensics; File systems; History; Information analysis; Information science; Information security; Kernel; Laboratories; Proposals; Virtual machining; digital forensics; log integrity; virtualization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security and Assurance, 2008. ISA 2008. International Conference on
  • Conference_Location
    Busan
  • Print_ISBN
    978-0-7695-3126-7
  • Type

    conf

  • DOI
    10.1109/ISA.2008.96
  • Filename
    4511604