Method for Verifying Log Integrity

CHEN Li-ming,YU Yan,HUANG Hao
2005-01-01
Journal of Computer Applications
Abstract:All kinds of system events are stored in logs. After a successful intrusion, the intruder will try to modify the logs to conceal the intrusion. A method for verifying and protecting log integrity was described to make all log entries generated prior to the logging system's compromise impossible for the attacker to undetectably modify. A set of trusted log entries was provided to other programs when damages are made to log integrity.
What problem does this paper attempt to address?