A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT
Abstract Cloud-assisted Cognitive Internet of Things has powerful data analytics abilities
based on the computing and data storage capabilities of cloud virtual machines, which …
based on the computing and data storage capabilities of cloud virtual machines, which …
Data privacy mechanisms development and performance evaluation for personal and ubiquitous blockchain-based storage
YF Wen, CP Wang - The Journal of Supercomputing, 2023 - Springer
In the era of global communication and the sharing economy, the demand for personal and
ubiquitous storage among enterprises and individual users has increased; thus, the flexible …
ubiquitous storage among enterprises and individual users has increased; thus, the flexible …
Fingerprinting of Machines in Critical Systems for Integrity Monitoring and Verification
P Paliwal, A Sable, MK Hanawal - arXiv preprint arXiv:2412.16595, 2024 - arxiv.org
As cyber threats continue to evolve and diversify, it has become increasingly challenging to
identify the root causes of security breaches that occur between periodic security …
identify the root causes of security breaches that occur between periodic security …
Protecting critical files using target-based virtual machine introspection approach
Protecting critical files in operating system is very important to system security. With the
increasing adoption of Virtual Machine Introspection (VMI), designing VMI-based monitoring …
increasing adoption of Virtual Machine Introspection (VMI), designing VMI-based monitoring …
Investigating the Effectiveness of Hash Line Baseline for File Integrity Monitoring
A Jukuntla, G Gutha, A Palem… - … on Image Processing …, 2024 - ieeexplore.ieee.org
This study outlines the value of file integrity and the effective role hashing plays in
maintaining it. The goal of the study is to assess how well these techniques make use of …
maintaining it. The goal of the study is to assess how well these techniques make use of …
A novel integrity measurement method based on copy-on-write for region in virtual machine
S Li, L Xiao, L Ruan, S Su - Future Generation Computer Systems, 2019 - Elsevier
More and more enterprises are migrating services and data into virtual machine (VM) using
base and increment, and the files in the VM may contain critical data. Therefore, it is …
base and increment, and the files in the VM may contain critical data. Therefore, it is …
[PDF][PDF] Securing Systems using SIEM and FIM Tools
MV Kumar, A Yadav, S Bhorde - 2024 - academia.edu
Today, computer networks are heavily documented security issues, making it impractical to
manage them without Security Event Management (SIEM). A SIEM solution sets the controls …
manage them without Security Event Management (SIEM). A SIEM solution sets the controls …
[PDF][PDF] Building a System for Monitoring Sensitive Files
ZF Khadir - cdnx.uobabylon.edu.iq
File protection has always attracted considerable interest in both industry and academia,
since almost all the data and information are stored in files in modern computer systems …
since almost all the data and information are stored in files in modern computer systems …
Study of Local Monitoring System Based on SMS Under the Cloud Environment
Y Zhang, J Zou, Y Gao - … Application and Wireless Sensor: UCAWSN-14, 2015 - Springer
To enhance the overall safety of cloud service and ensure the data integrity and to ease the
burden of monitoring system, cluster analysis is introduced into the paper to divide users into …
burden of monitoring system, cluster analysis is introduced into the paper to divide users into …
[PDF][PDF] VBD-MF: A Block Device to Monitor the File System of Virtual Machine
R LOU, L JIANG, Y WANG - scholar.archive.org
The virtual block device is the data carrier of virtual machine (VM) and user information,
while the file system is the ultimate goal of many attackers. We proposed a security device …
while the file system is the ultimate goal of many attackers. We proposed a security device …