File integrity monitoring tools: Issues, challenges, and solutions
Summary Ensuring integrity of sensitive files in file systems is imperative to computer systems. The vast majority of attacks work through unapproved or unauthorized access to sensitive files to take secret data like secret keys, passwords, credit card numbers, and so on. After that, attackers gener...
Saved in:
Published in: | Concurrency and computation Vol. 32; no. 22 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
Hoboken, USA
John Wiley & Sons, Inc
25-11-2020
Wiley Subscription Services, Inc |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Summary
Ensuring integrity of sensitive files in file systems is imperative to computer systems. The vast majority of attacks work through unapproved or unauthorized access to sensitive files to take secret data like secret keys, passwords, credit card numbers, and so on. After that, attackers generally conceal their traces by subverting critical files like system logs. File system integrity monitoring is a well‐known way to deal with ensuring integrity of sensitive and critical files. The file system is at the heart of any computing system as it stores the data and executable programs. Malicious users or malwares might change the content of a sensitive data file or insert malicious payload in an executable. Hence, monitoring the integrity of the files in the file system is of utmost importance. Significant research work has been done on file integrity monitoring tools. This article presents the currently available tools for file integrity monitoring and their underlying approaches. |
---|---|
Bibliography: | Funding information Department of Defence: United States Department of Defence |
ISSN: | 1532-0626 1532-0634 |
DOI: | 10.1002/cpe.5825 |