Mobility-Enhanced File Integrity Analyzer For Networked Environments

نویسندگان

  • Guantong Wang
  • Ronald F. DeMara
  • Adam J. Rocke
چکیده

The ability to monitor computer file systems for unauthorized changes is a powerful administrative tool. Ideally this task could be performed remotely under the direction of the administrator to allow on-demand checking, and use of tailorable reporting and exception policies targeted to adjustable groups of network elements. This paper introduces M-FICA, a Mobile File Integrity and Consistency Analyzer as a prototype to achieve this capability using mobile agents. The M-FICA file tampering detection approach uses MD5 message digests to identify file changes. Two agent types, Initiator and Examiner, are used to perform file integrity tasks. An Initiator travels to client systems, computes a file digest, then stores those digests in a database file located on write-once media. An Examiner agent computes a new digest to compare with the original digests in the database file. Changes in digest values indicate that the file contents have been modified. The design and evaluation results for a prototype developed in the Concordia agent framework are described.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Avatar Mobility in Networked Virtual Environments: Measurements, Analysis, and Implications

We collected mobility traces of 84,208 avatars spanning 22 regions over two months in Second Life, a popular networked virtual environment. We analyzed the traces to characterize the dynamics of the avatars mobility and behavior, both temporally and spatially. We discuss the implications of the our findings to the design of peer-to-peer networked virtual environments, interest management, mobil...

متن کامل

Formal Analysis of Dynamic, Distributed File-System Access Controls

We model networked storage systems with distributed, cryptographically enforced file-access control in an applied pi calculus. The calculus contains cryptographic primitives and supports file-system constructs, including access revocation. We establish that the networked storage systems implement simpler, centralized storage specifications with local access-control checks. More specifically, we...

متن کامل

Efficient Cryptographic Techniques for Securing Storage Systems Thesis Proposal

With the advance of storage technologies to networked-attached storage, a recently emerging architecture that provides higher performance and availability than traditional direct-attached disks, new security concerns arise. In these environments, clients can no longer rely only on the storage servers to provide security guarantees, since these become now easier to compromise. In consequence, cl...

متن کامل

Human Mobility in Virtual and Real Worlds

The performance of networked systems that support common human activities, such as mobile communication and participation in online games, depends on the characteristics of human mobility. Human mobility models are crucial in the design and tuning of these systems, but depend on detailed and long-term human mobility traces, which, in turn, are difficult to obtain from real environments. Thus, a...

متن کامل

VERITAS Software Corporation

VERITAS, t h e VERITAS logo , VxFS, VxVM, Fi rstWat ch and VERITAS Fi rstWat ch are regi s t e re d trademark s o f VERITAS Softwa re Corporat i o n. VxServerSuite and VxSmartSync are t rademarks of VERITAS Softwa re Corporation. Other product names mentioned herein may be trademarks and/or regi s t e re d trademarks of their respective companies. Overview The VERITAS storage management product...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005