2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications 2011
DOI: 10.1109/trustcom.2011.100
|View full text |Cite
|
Sign up to set email alerts
|

Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(44 citation statements)
references
References 4 publications
0
44
0
Order By: Relevance
“…They often hook system calls or backend drivers to get the attributes of the operated target files. Flogger [6] can be implemented in both VM and PM (physical machine) kernels, which captures file operations and then records the events in log files. [7] and [8] intercept file operations in VMM.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They often hook system calls or backend drivers to get the attributes of the operated target files. Flogger [6] can be implemented in both VM and PM (physical machine) kernels, which captures file operations and then records the events in log files. [7] and [8] intercept file operations in VMM.…”
Section: Related Workmentioning
confidence: 99%
“…Since VMM is more privileged and also transparent to VM, VM-level malwares are difficult to be aware of or even attack VMM-level agents. As far as we know, VMI-based filesystem monitoring tools can be classified as: polling scheme [4], [5] and event-driven scheme [6]- [11]. The former examines file integrity in each interval, but leaves a gap between checkpoints exploited by malwares to modify the files transiently and then roll back without being detected, which undermines its effectiveness.…”
Section: Introductionmentioning
confidence: 99%
“…open, close, write. Flogger [15] File centric logger for monitoring file access and transfers within cloud. Tripwire [16] A Host based IDS that alerts on macro changes to the files and folders.…”
Section: Related Workmentioning
confidence: 99%
“…The project also focused on the development of a prototype to verify the results [7]. In December, The TrustCloud Research Project was started at the HP Institute in Singapore [1,2]. The TrustCloud framework, which consisted of five layers with management responsibility and computing transparency, began with a data-centric approach [3].…”
Section: The Concept Of Cloud Computing and Interoperabilitymentioning
confidence: 99%