TECHNIQUES FOR DETECTING FILE MODIFICATIONS ABOUT INTERNAL ATTACK

Lu Jun,Liu Daxin,Ding Dayong
DOI: https://doi.org/10.3969/j.issn.1000-386X.2006.06.016
2006-01-01
Abstract:This paper summarized methods of detecting file modification.We put forward log-watching one another by using affixed log for defending internal attack.Watching log and affixed log watch each other,so they can inspect malicious attack from internal skill attacker.To multilevel-log method,log-watching method economizes more resource and system spending.It is more efficiently.
What problem does this paper attempt to address?