Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
File Integrity Checkers: Functionality, Attacks, and Protection
Author(s):
1. Ahmed Salman: Military College of Signals Rawalpindi, Pakistan
2. Muhammad Sohaib Khan: Military College of Signals Rawalpindi, Pakistan
3. Sarmad Idrees: Military College of Signals Rawalpindi, Pakistan
4. Faisal Akram: Military College of Signals Rawalpindi, Pakistan
5. Muhammad Junaid: Military College of Signals Rawalpindi, Pakistan
6. Aamer Latif Malik: Military College of Signals Rawalpindi, Pakistan
Abstract:
Intrusion detection systems form an essential part of a network's security posture. Intrusion detection systems come in many shapes and forms, each using different techniques and analysis mechanisms. Intrusion detection systems at the host level are commonly known as host-based intrusion detection systems or HIDS and generally have a database (DB) of signatures or a profile to carry out the detection analysis. In all host-based systems, the detection is completely dependent upon the integrity of the database. An attacker can easily defeat the HIDS if he is able to modify the database as per his own designs. In this paper, we have focused our study on file integrity checking HIDS. An endeavour has been made to study this specific type of HIDs functionality and various attacks against its trusted operation. Different techniques used to secure the system database have been studied, however, none are found to be flawless. We conclude that the use of Blockchain can be a viable solution in the future to secure the critical database integrity in such systems.
Page(s): 1-1
DOI: DOI not available
Published: Journal: IEEE International Conference on Digital Futures and Transformative Technologies (ICoDT2) May 24-26, 2022 (Book of Abstracts), Volume: 1, Issue: 1, Year: 2022
Keywords:
File Integrity Checkers , Networks security posture , Intrusion detection systems
References:
References are not available for this document.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

24

Views