[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SADFE.2008.14guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model

Published: 22 May 2008 Publication History

Abstract

This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with this phase of the work is to implement the proposed method and evaluate the forensic validity of the method under real-world conditions. This paper discusses that implementation and the ability for the generated authentication logs and access fingerprints to both identify malicious activity and identify the source of this activity. While work has been done to develop secure log files, i.e., making them tamper resistant, there has been no prior work to ensure they are forensically valid.

Cited By

View all
  • (2009)Efficient data structures for tamper-evident loggingProceedings of the 18th conference on USENIX security symposium10.5555/1855768.1855788(317-334)Online publication date: 10-Aug-2009

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SADFE '08: Proceedings of the 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering
May 2008
144 pages
ISBN:9780769531717

Publisher

IEEE Computer Society

United States

Publication History

Published: 22 May 2008

Author Tags

  1. Digital Forensics
  2. Forensic Validity
  3. Syslog Authentication

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2009)Efficient data structures for tamper-evident loggingProceedings of the 18th conference on USENIX security symposium10.5555/1855768.1855788(317-334)Online publication date: 10-Aug-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media