Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity monitoring tools are widely used to detect any malicious modification to these critical files. Two methods, off-line and on-line file integrity monitoring have their own disadvantages. This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. Files are divided based on their security level...
Paper presents the concept of the hash function use in order to examine changes in file integration ...
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized ...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
File is a component of a computer system that has importance value of its own, either in terms of av...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
Obfuscation and cryptography technologies are applied to malware to make the detection of malware th...
“... oba es gibt kan Kompromiß, zwischen ehrlich sein und link, a wann’s no so afoch ausschaut, und ...
Every organization�s asset is its data and data are stored in files which are maintained by file sys...
This guide describes the use of MultiHasher, an integrity monitoring tool for Microsoft Windows that...
The purpose of this paper is to identify and contend with the threat of program modification attacks...
Modern operating systems have security threats from different perspectives, logging for instance. Lo...
The article describes the concept of the information integrity, control information integrity and th...
Abstract—Monitoring a process and its file I/O behaviors is important for security inspection for a ...
The ability to get real-time notifications about unexpected changes in files or directory structure ...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Paper presents the concept of the hash function use in order to examine changes in file integration ...
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized ...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
File is a component of a computer system that has importance value of its own, either in terms of av...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
Obfuscation and cryptography technologies are applied to malware to make the detection of malware th...
“... oba es gibt kan Kompromiß, zwischen ehrlich sein und link, a wann’s no so afoch ausschaut, und ...
Every organization�s asset is its data and data are stored in files which are maintained by file sys...
This guide describes the use of MultiHasher, an integrity monitoring tool for Microsoft Windows that...
The purpose of this paper is to identify and contend with the threat of program modification attacks...
Modern operating systems have security threats from different perspectives, logging for instance. Lo...
The article describes the concept of the information integrity, control information integrity and th...
Abstract—Monitoring a process and its file I/O behaviors is important for security inspection for a ...
The ability to get real-time notifications about unexpected changes in files or directory structure ...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Paper presents the concept of the hash function use in order to examine changes in file integration ...
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized ...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...