2020
DOI: 10.1002/cpe.5825
|View full text |Cite
|
Sign up to set email alerts
|

File integrity monitoring tools: Issues, challenges, and solutions

Abstract: Ensuring integrity of sensitive files in file systems is imperative to computer systems. The vast majority of attacks work through unapproved or unauthorized access to sensitive files to take secret data like secret keys, passwords, credit card numbers, and so on. After that, attackers generally conceal their traces by subverting critical files like system logs. File system integrity monitoring is a well-known way to deal with ensuring integrity of sensitive and critical files. The file system is at the heart … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…These tools continuously monitor the file system for changes, including changes to file attributes, content, and timestamps. They can generate alerts when unauthorized or unexpected modifications occur [30], [26].…”
Section: Literature Review and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…These tools continuously monitor the file system for changes, including changes to file attributes, content, and timestamps. They can generate alerts when unauthorized or unexpected modifications occur [30], [26].…”
Section: Literature Review and Related Workmentioning
confidence: 99%
“…Current FITs work offline pattern which means these tools will monitor the files at scheduled times to check the integrity of the system. Delay in detection is the biggest issue because this will create an opportunity for the intruder to take advantage of the system [30].…”
Section: Literature Review and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Once captured, the data undergoes rigorous preprocessing to filter out background network noise, thereby accentuating the characteristics unique to ransomware traffic. This preprocessing includes techniques such as signature-based analysis to identify known ransomware patterns, file integrity monitoring for detecting unauthorized alterations, and entropy scanning to identify randomness in encrypted files [17,22,28,44]. The result is a comprehensive dataset that embodies a diverse array of ransomware activities, laying the groundwork for subsequent analysis using the BERT model.…”
Section: Network Traffic Datasetsmentioning
confidence: 99%
“…We refer readers to Ref. [20] for detail comparison of currently available tools for file integrity monitoring and their underlying approaches.…”
Section: Related Workmentioning
confidence: 99%