The ability to monitor computer file systems for unauthorized changes is a powerful administrative tool. Ideally this task could be performed remotely under the direction of the administrator to allow on-demand checking, and use of tailorable reporting and exception policies targeted to adjustable groups of network elements. This paper introduces M-FICA, a Mobile File Integrity and Consistency Analyzer as a prototype to achieve this capability using mobile agents. The M-FICA file tampering detection approach uses MD5 message digests to identify file changes. Two agent types, Initiator and Examiner, are used to perform file integrity tasks. An Initiator travels to client systems, computes a file digest, then stores those digests in a databas...
File is a component of a computer system that has importance value of its own, either in terms of av...
At the heart of most computer systems is a file system. The file system contains user data, executab...
Mobile users bring new challenges to distributed file systems. First, the network costs between clie...
The ability to monitor computer file systems for unauthorized changes is a powerful administrative t...
An insider-robust approach to file integrity verification is developed using interacting strata of m...
An insider-robust approach to file integrity verification is developed using interacting strata of ...
The ability to get real-time notifications about unexpected changes in files or directory structure ...
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous ...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
Do you trust your OS? How to make sure that someone hasn’t replaced some system files? A file integr...
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing fi...
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing fi...
Detection of malicious activity by insiders, people with legitimate access to resources and services...
Detection of malicious activity by insiders, people with legitimate access to resources and services...
This guide describes the use of MultiHasher, an integrity monitoring tool for Microsoft Windows that...
File is a component of a computer system that has importance value of its own, either in terms of av...
At the heart of most computer systems is a file system. The file system contains user data, executab...
Mobile users bring new challenges to distributed file systems. First, the network costs between clie...
The ability to monitor computer file systems for unauthorized changes is a powerful administrative t...
An insider-robust approach to file integrity verification is developed using interacting strata of m...
An insider-robust approach to file integrity verification is developed using interacting strata of ...
The ability to get real-time notifications about unexpected changes in files or directory structure ...
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous ...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
Do you trust your OS? How to make sure that someone hasn’t replaced some system files? A file integr...
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing fi...
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing fi...
Detection of malicious activity by insiders, people with legitimate access to resources and services...
Detection of malicious activity by insiders, people with legitimate access to resources and services...
This guide describes the use of MultiHasher, an integrity monitoring tool for Microsoft Windows that...
File is a component of a computer system that has importance value of its own, either in terms of av...
At the heart of most computer systems is a file system. The file system contains user data, executab...
Mobile users bring new challenges to distributed file systems. First, the network costs between clie...