2 research outputs found
Tamper-Resistant Peer-to-Peer Storage for File Integrity Checking.
â... oba es gibt kan KompromiĂ, zwischen ehrlich sein und link, a wannâs no so afoch ausschaut, und wannâs noch so uÌblich is...â â Wolfgang Ambros, 1975 One of the activities of most successful intruders of a computer system is to modify data on the victim, either to hide his/her presence and to destroy the evidence of the break-in, or to subvert the system completely and make it accessible for further abuse without triggering alarms. File integrity checking is one common method to mitigate the effects of successful intrusions by detecting the changes an intruder makes to files on a computer system. Historically file integrity checking has been implemented using tools that operate locally on a single system, which imposes quite some restrictions regarding maintenance and scalability. Recent improvements for large scale environments have introduced trusted central servers which provide secure fingerprint storage and logging facilities, but such centralism presents some new shortcomings