2008 1st International Conference on Information Technology 2008
DOI: 10.1109/inftech.2008.4621669
|View full text |Cite
|
Sign up to set email alerts
|

Modern approaches to file system integrity checking

Abstract: One of the means to detect intruder's activity is to trace all unauthorized changes in a file system. Programs which fulfill this functionality are called file integrity checkers. This paper concerns modern approach to file system integrity checking. It reviews architecture of popular systems that are widely used in production environment as well as scientific projects, which not only detect intruders but also take actions to stop their activity. The concept and architecture of ICAR System (Integrity Checking … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…In addition to supporting traditional file-level integrity checks, I3FS also supports page-level integrity checking. Kaczmarek et al [6] designed a file system integrity protection scheme based on the LSM framework [7].…”
Section: Related Workmentioning
confidence: 99%
“…In addition to supporting traditional file-level integrity checks, I3FS also supports page-level integrity checking. Kaczmarek et al [6] designed a file system integrity protection scheme based on the LSM framework [7].…”
Section: Related Workmentioning
confidence: 99%
“…Jerzy Kaczmarek et al presented the concept and architecture of the ICAR System (Integrity Checking And Restoring System) [19]. The ICAR System not only covers the functions of integrity checkers but also automatically restores files.…”
Section: Related Workmentioning
confidence: 99%
“…We propose a novel system that enables file integrity verification -Integrity Checking and Recovery (ICAR) -implemented as an in-kernel LSMbased module [4]. Our system overcomes the shortcomings of existing solutions taking the following main assumptions:…”
Section: Introductionmentioning
confidence: 99%