Selected article for: "activity level and key information"

Author: Kurniawan, Kabul; Ekelhart, Andreas; Ekaputra, Fajar; Kiesling, Elmar
Title: Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach
  • Cord-id: mtul0xqw
  • Document date: 2020_8_1
  • ID: mtul0xqw
    Snippet: Ensuring data confidentiality and integrity are key concerns for information security professionals, who typically have to obtain and integrate information from multiple sources to detect unauthorized data modifications and transmissions. The instrumentation that operating systems provide for the monitoring of file system level activity can yield important clues on possible data tampering and exfiltration activity but the raw data that these tools provide is difficult to interpret, contextualize
    Document: Ensuring data confidentiality and integrity are key concerns for information security professionals, who typically have to obtain and integrate information from multiple sources to detect unauthorized data modifications and transmissions. The instrumentation that operating systems provide for the monitoring of file system level activity can yield important clues on possible data tampering and exfiltration activity but the raw data that these tools provide is difficult to interpret, contextualize and query. In this paper, we propose and implement an architecture for file system activity log acquisition, extraction, linking and storage that leverages semantic techniques to tackle limitations of existing monitoring approaches in terms of integration, contextualization, and cross-platform interoperability. We illustrate the applicability of the proposed approach in both forensic and monitoring scenarios and conduct a performance evaluation in a virtual setting.

    Search related documents:
    Co phrase search for related documents
    • academic literature and activity monitoring: 1
    • access time and activity monitoring: 1