File integrity monitoring tools: Issues, challenges, and solutions

Summary Ensuring integrity of sensitive files in file systems is imperative to computer systems. The vast majority of attacks work through unapproved or unauthorized access to sensitive files to take secret data like secret keys, passwords, credit card numbers, and so on. After that, attackers gener...

Full description

Saved in:
Bibliographic Details
Published in:Concurrency and computation Vol. 32; no. 22
Main Authors: Peddoju, Suresh K., Upadhyay, Himanshu, Lagos, Leonel
Format: Journal Article
Language:English
Published: Hoboken, USA John Wiley & Sons, Inc 25-11-2020
Wiley Subscription Services, Inc
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Summary Ensuring integrity of sensitive files in file systems is imperative to computer systems. The vast majority of attacks work through unapproved or unauthorized access to sensitive files to take secret data like secret keys, passwords, credit card numbers, and so on. After that, attackers generally conceal their traces by subverting critical files like system logs. File system integrity monitoring is a well‐known way to deal with ensuring integrity of sensitive and critical files. The file system is at the heart of any computing system as it stores the data and executable programs. Malicious users or malwares might change the content of a sensitive data file or insert malicious payload in an executable. Hence, monitoring the integrity of the files in the file system is of utmost importance. Significant research work has been done on file integrity monitoring tools. This article presents the currently available tools for file integrity monitoring and their underlying approaches.
Bibliography:Funding information
Department of Defence: United States Department of Defence
ISSN:1532-0626
1532-0634
DOI:10.1002/cpe.5825