DocumentCode
3371948
Title
A Secure Virtualized Logging Scheme for Digital Forensics in Comparison with Kernel Module Approach
Author
Chou, Bin-Hui ; Tatara, Kohei ; Sakuraba, Taketoshi ; Hori, Yoshiaki ; Sakurai, Kouichi
Author_Institution
Grad. Inst. of Inf. Sci. & Electr. Eng., Kyushu Univ., Fukuoka
fYear
2008
fDate
24-26 April 2008
Firstpage
421
Lastpage
426
Abstract
Digital forensics encompasses the process of identifying the perpetrator and the criminal method by analyzing the logs generated in the computer. Log files record the activities of the computer and by reading them one can know what kind of event happened at a certain time. Therefore, secure logs with the integrity property are essential. In this paper, we discuss two approaches to achieve the integrity of logs- the kernel module and virtualization, and compare them. Although virtualization is more inefficient in performance than the kernel module, it provides more security properties for logs. Thus, we then focus on the virtualization approach with a detailed proposal, which describes ways to preserve logs without tampering and deletion.
Keywords
computer crime; security of data; system monitoring; Log files; criminal method; digital forensics; integrity property; kernel module approach; perpetrator; virtualized logging scheme; Digital forensics; File systems; History; Information analysis; Information science; Information security; Kernel; Laboratories; Proposals; Virtual machining; digital forensics; log integrity; virtualization;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Security and Assurance, 2008. ISA 2008. International Conference on
Conference_Location
Busan
Print_ISBN
978-0-7695-3126-7
Type
conf
DOI
10.1109/ISA.2008.96
Filename
4511604
Link To Document