File integrity monitor scheduling based on file security level classification

Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity monitoring tools are widely used...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam
Format: Conference or Workshop Item
Language:English
Published: Springer 2011
Online Access:http://psasir.upm.edu.my/id/eprint/76646/1/File%20integrity%20monitor%20scheduling%20based%20on%20file%20security%20level%20classification.pdf
http://psasir.upm.edu.my/id/eprint/76646/
https://link.springer.com/chapter/10.1007/978-3-642-22191-0_16
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity monitoring tools are widely used to detect any malicious modification to these critical files. Two methods, off-line and on-line file integrity monitoring have their own disadvantages. This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. The initial testing result shows that our system is effective in on-line detection of file modification.