File Modification Pattern Detection Mechanism Using File Similarity Information

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Log File Modification Detection and Location Using Fragile Watermark

In this paper, a novel algorithm is proposed to protect the integrity of log files. Unlike other existing schemes, the proposed algorithm can detect and locate any malicious modifications made to the log files. Furthermore, massive deletion of continuous data can be classified and identified. Security analysis shows that the algorithm can detect modifications with high probability which is veri...

متن کامل

A DRM Scheme Using File Physical Information

* Yinyan Yu is the corresponding author. Abstract—A digital file has both the content and physical information, however the latter was not fully made use of in previous digital rights management (DRM) systems. This paper introduces the idea of making use of file physical information to improve the system security and provides a scheme based on this idea to resist the replay attack in DRM system...

متن کامل

Log File Anomaly Detection

Analysis of log files pertaining to a failed run can be a tedious task, especially if the file runs into thousands of lines. Using the recent development in text analysis using deep neural networks, we present a method to reduce effort needed to analyze the log file by highlighting the most probably useful text in the failed log file, which can assist in debugging the causes of the failure. In ...

متن کامل

Low Overhead File Synchronization Mechanism

Traditional file synchronization programs have difficulties in handling lots of metadata information when the file is transferred to the server. In this paper, we propose a practical approach for minimizing metadata exchanging overhead on the file synchronization system. The key idea of this paper is to adapt hash key compression technique that computes new hash key with several hash keys.

متن کامل

Exploiting Similarity for Multi-Source Downloads Using File Handprints

Many contemporary approaches for speeding up large file transfers attempt to download chunks of a data object from multiple sources. Systems such as BitTorrent quickly locate sources that have an exact copy of the desired object, but they are unable to use sources that serve similar but non-identical objects. Other systems automatically exploit cross-file similarity by identifying sources for e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of advanced smart convergence

سال: 2012

ISSN: 2288-2847

DOI: 10.7236/jasc2012.1.1.6