File Modification Pattern Detection Mechanism Using File Similarity Information
نویسندگان
چکیده
منابع مشابه
Log File Modification Detection and Location Using Fragile Watermark
In this paper, a novel algorithm is proposed to protect the integrity of log files. Unlike other existing schemes, the proposed algorithm can detect and locate any malicious modifications made to the log files. Furthermore, massive deletion of continuous data can be classified and identified. Security analysis shows that the algorithm can detect modifications with high probability which is veri...
متن کاملA DRM Scheme Using File Physical Information
* Yinyan Yu is the corresponding author. Abstract—A digital file has both the content and physical information, however the latter was not fully made use of in previous digital rights management (DRM) systems. This paper introduces the idea of making use of file physical information to improve the system security and provides a scheme based on this idea to resist the replay attack in DRM system...
متن کاملLog File Anomaly Detection
Analysis of log files pertaining to a failed run can be a tedious task, especially if the file runs into thousands of lines. Using the recent development in text analysis using deep neural networks, we present a method to reduce effort needed to analyze the log file by highlighting the most probably useful text in the failed log file, which can assist in debugging the causes of the failure. In ...
متن کاملLow Overhead File Synchronization Mechanism
Traditional file synchronization programs have difficulties in handling lots of metadata information when the file is transferred to the server. In this paper, we propose a practical approach for minimizing metadata exchanging overhead on the file synchronization system. The key idea of this paper is to adapt hash key compression technique that computes new hash key with several hash keys.
متن کاملExploiting Similarity for Multi-Source Downloads Using File Handprints
Many contemporary approaches for speeding up large file transfers attempt to download chunks of a data object from multiple sources. Systems such as BitTorrent quickly locate sources that have an exact copy of the desired object, but they are unable to use sources that serve similar but non-identical objects. Other systems automatically exploit cross-file similarity by identifying sources for e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of advanced smart convergence
سال: 2012
ISSN: 2288-2847
DOI: 10.7236/jasc2012.1.1.6