Secure logging system with self-protecting function


The Transactions of the Korea Information Processing Society (1994 ~ 2000), Vol. 6, No. 9, pp. 2442-2450, Sep. 1999
10.3745/KIPSTE.1999.6.9.2442,   PDF Download:

Abstract

The audit logging system is to write the details of system use and access on networks. These details are used for trailing the route, when illegal access or using system resource is occurred on networks. The logging system, therefor, might be the first target of intruder. We developed the logging system which writes the information of login and command execution on UNIX system. And we prepared the self-protecting functions of blocking intruder's attack on the logging system. They are protecting the logging process and the log file. To protect the logging process, we made it keep changing the process ID to avoid the intruder's attack. To protect the log file, we use hard link and mandatory file locking, so it can make it impossible to delete or change log file.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
K. M. Soo and N. B. Nam, "Secure logging system with self-protecting function," The Transactions of the Korea Information Processing Society (1994 ~ 2000), vol. 6, no. 9, pp. 2442-2450, 1999. DOI: 10.3745/KIPSTE.1999.6.9.2442.

[ACM Style]
Kim Min Soo and Noh Bong Nam. 1999. Secure logging system with self-protecting function. The Transactions of the Korea Information Processing Society (1994 ~ 2000), 6, 9, (1999), 2442-2450. DOI: 10.3745/KIPSTE.1999.6.9.2442.