1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: jetwi@etpub.com.
2.Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication. Papers with insufficient content may be rejected as well, make sure your paper is sufficient enough to be published...[Read More]

Recovery Based Architecture to Protect Hids Log Files using Time Stamps

Surinder Singh Khurana, Divya Bansal , and Sanjeev Sofat
Punjab Engg. College, Chandigarh, India
AbstractAfter the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions in technology, the threat of attacks through computer networks becomes a large issue. Host Based Intrusion Detection is a part of security system that protects hosts from various kinds of attacks. It also provides a great degree of visibility (of system activities). It is quite widest that HIDS are vulnerable to attacks. An adversary, if successfully enters in a system can disable HIDS or modify HIDS rules to hide its existence. One can easily evade HIDS. In [7] we propose a new architecture that protects HIDS from such attacks. In this paper, we have proposed a new mechanism to check integrity of log files. We have discussed its affects on performance of system.  

Cite: Surinder Singh Khurana, Divya Bansal , and Sanjeev Sofat, "Recovery Based Architecture to Protect Hids Log Files using Time Stamps," Journal of Emerging Technologies in Web Intelligence, Vol. 2, No. 2, pp. 110-114, May 2010. doi:10.4304/jetwi.2.2.110-114
Copyright © 2013-2020 Journal of Emerging Technologies in Web Intelligence, All Rights Reserved
E-mail: jetwi@etpub.com