Browse > Article
http://dx.doi.org/10.6109/jkiice.2010.14.7.1610

A Secure Logging for Collection of Digital Evidences  

Shin, Weon (동명대학교 정보보호학과)
Abstract
By analyzing logs in computer systems, we can find early various threats and discover answers to respond against them. Also logs can help to collect digital evidences for cybercrimes and to be legal effects for investigation. In this paper, we intend to develop a secure logging in computer systems. Therefore we propose a new secure logging scheme and improve it to apply various environments. The proposed scheme will helps to develop a better logging of collection for digital evidences in computer systems.
Keywords
Logging; Digital evidence;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. Schneier and J. Kelsey, "Security audit logs to support computer forensics," ACM TISSEC, vol. 2, no. 2, pp.159-176, 1999   DOI
2 M. Bellare and B. Yee, "Forward integrity for secure audit logs," University of California, San Diego, Dept. of Computer Science & Engineering, Tech. Rep., 1997
3 J. Kelsey and J. Callas, "Signed syslog messages," IETF Internet Draft, 2005, http://www.ietf.org/internet-drafts/draft-ietf-syslog-sign-16.txt
4 Computer data logging, http://en.wikipedia.org/wiki/Computer_data_logging
5 D. Ma and G. Tsudik, "A new approach to secure logging," ACM Trans. on Storage, vol. 5, no. 1, pp. 1-21, 2009.
6 "인터넷 침해사고 동향 및 분석 월보 200912", 한국인터넷진흥원 인터넷침해대응센터, 2009.
7 김소이, "전자금융사고 발생유형 및 대응현황", 금융결제원 금융결제연구소 지급결제와 정보기술 제38호, 2009