Implementation of file interpolation detection system

Naomi Fujimura, Jin Mei
{"title":"Implementation of file interpolation detection system","authors":"Naomi Fujimura, Jin Mei","doi":"10.1145/1294046.1294073","DOIUrl":null,"url":null,"abstract":"Recently we have found a high possibility to encounter file interpolation and Web defacements by vicious crackers and software. It is not easy for us to find such interpolated files because of the numbers and volumes of files are great in computer systems. We need a good tool such as \"Tripwire\" for that purpose. However, such a system is only for system administrators and not for users. It is also difficult for administrators to set up the configuration file to do the suitable file check. We implemented the file interpolation detection system for both administrators and users. The system detects insertion, deletion, and modification (interpolation) of files. Both administrators and users can check the files concerned to themselves and get the result. Users can update the file specification information in the database by command, then it makes the system possible to avoid finding of the error interpolation. The system can be periodically executed by CRON or on demand by users, and then compares the value of MD5 for each file to detect file interpolation. The system has the command line interface and Web interface. The system first creates the database that contains full path file name, last update time, and values of MD5 according to the information set-upped by users that specifies the location to check for each user. It judges the insertion and deletion of files by the existence and no existence of records in the database. It also judges the file interpolation by the comparison with the value of MD5 for every file. It reports the result by e-mail, in command line interface, or in Web interface.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 35th annual ACM SIGUCCS fall conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1294046.1294073","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Recently we have found a high possibility to encounter file interpolation and Web defacements by vicious crackers and software. It is not easy for us to find such interpolated files because of the numbers and volumes of files are great in computer systems. We need a good tool such as "Tripwire" for that purpose. However, such a system is only for system administrators and not for users. It is also difficult for administrators to set up the configuration file to do the suitable file check. We implemented the file interpolation detection system for both administrators and users. The system detects insertion, deletion, and modification (interpolation) of files. Both administrators and users can check the files concerned to themselves and get the result. Users can update the file specification information in the database by command, then it makes the system possible to avoid finding of the error interpolation. The system can be periodically executed by CRON or on demand by users, and then compares the value of MD5 for each file to detect file interpolation. The system has the command line interface and Web interface. The system first creates the database that contains full path file name, last update time, and values of MD5 according to the information set-upped by users that specifies the location to check for each user. It judges the insertion and deletion of files by the existence and no existence of records in the database. It also judges the file interpolation by the comparison with the value of MD5 for every file. It reports the result by e-mail, in command line interface, or in Web interface.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
实现文件插值检测系统
最近,我们发现很有可能遇到恶意破解者和软件的文件插值和Web破坏。由于计算机系统中文件的数量和体积都很大,查找这样的插入文件并不容易。为此,我们需要一个好的工具,如“Tripwire”。但是,这样的系统仅适用于系统管理员,而不适用于用户。管理员也很难设置配置文件来进行适当的文件检查。我们为管理员和用户实现了文件插值检测系统。系统检测文件的插入、删除和修改(插补)。管理员和用户都可以检查与自己有关的文件并获得结果。用户可以通过命令更新数据库中的文件规格信息,从而使系统可以避免查找到错误插补。系统可以通过CRON周期性执行,也可以根据用户需求执行,然后比较每个文件的MD5值,检测文件插补。系统具有命令行界面和Web界面。系统首先根据用户设置的信息创建包含完整路径文件名、最后更新时间和MD5值的数据库,并为每个用户指定要检查的位置。它通过数据库中是否存在记录来判断文件的插入和删除。它还通过与每个文件的MD5值的比较来判断文件插值。它通过电子邮件、命令行界面或Web界面报告结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The dual os classroom: if you build it, will they come? Looking for the magic formula: evaluating our it communication mix A campus-wide solution to supporting rich media capture, conversion, & production: the media conversion lab at the University of Michigan Is3pace: casting the information security spell for cultural change Getting it into the orientation mix
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1