Investigating the Effectiveness of Hash Line Baseline for File Integrity Monitoring

This study outlines the value of file integrity and the effective role hashing plays in maintaining it. The goal of the study is to assess how well these techniques make use of PowerShell's capabilities to monitor and protect important files in a system's file manager. It analyses the effe...

Full description

Saved in:
Bibliographic Details
Published in2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN) pp. 901 - 905
Main Authors Jukuntla, Amar, Gutha, Gayathri, Palem, Annjana, Kotaru, Sri Lakshmi Sowjanya, Alavala, Rajani
Format Conference Proceeding
LanguageEnglish
Published IEEE 03.07.2024
Subjects
Online AccessGet full text
DOI10.1109/ICIPCN63822.2024.00155

Cover

Loading…
Abstract This study outlines the value of file integrity and the effective role hashing plays in maintaining it. The goal of the study is to assess how well these techniques make use of PowerShell's capabilities to monitor and protect important files in a system's file manager. It analyses the effectiveness of the Baseline and Hash line in File Integrity Monitoring to see whether the approach can be used to improve file security. This study seeks to provide confidentiality, integrity, and availability to the files as a comprehensive integrity solution for all files in a system simultaneously. The CIA triad is emphasized in the findings as being fundamental to file management. By applying these concepts using PowerShell-based File Integrity Management, this aims to develop a cohesive integrity solution that can simultaneously secure all files on a system. This comprehensive strategy improves complete file security by protecting against internal and external weaknesses. The research discusses how PowerShell-driven FIM techniques might strengthen file security. This provides important insights towards creating comprehensive, reliable solutions for preserving file integrity across several systems by concentrating on the CIA trio.
AbstractList This study outlines the value of file integrity and the effective role hashing plays in maintaining it. The goal of the study is to assess how well these techniques make use of PowerShell's capabilities to monitor and protect important files in a system's file manager. It analyses the effectiveness of the Baseline and Hash line in File Integrity Monitoring to see whether the approach can be used to improve file security. This study seeks to provide confidentiality, integrity, and availability to the files as a comprehensive integrity solution for all files in a system simultaneously. The CIA triad is emphasized in the findings as being fundamental to file management. By applying these concepts using PowerShell-based File Integrity Management, this aims to develop a cohesive integrity solution that can simultaneously secure all files on a system. This comprehensive strategy improves complete file security by protecting against internal and external weaknesses. The research discusses how PowerShell-driven FIM techniques might strengthen file security. This provides important insights towards creating comprehensive, reliable solutions for preserving file integrity across several systems by concentrating on the CIA trio.
Author Alavala, Rajani
Palem, Annjana
Jukuntla, Amar
Kotaru, Sri Lakshmi Sowjanya
Gutha, Gayathri
Author_xml – sequence: 1
  givenname: Amar
  surname: Jukuntla
  fullname: Jukuntla, Amar
  email: ja_acse@vignan.ac.in
  organization: VFSTR Universtiy,Department of ACSE,Guntur,India
– sequence: 2
  givenname: Gayathri
  surname: Gutha
  fullname: Gutha, Gayathri
  email: gayathrichowdary1936@gmail.com
  organization: VFSTR Universtiy,Department of ACSE,Guntur,India
– sequence: 3
  givenname: Annjana
  surname: Palem
  fullname: Palem, Annjana
  email: palemannjana@gmail.com
  organization: VFSTR Universtiy,Department of ACSE,Guntur,India
– sequence: 4
  givenname: Sri Lakshmi Sowjanya
  surname: Kotaru
  fullname: Kotaru, Sri Lakshmi Sowjanya
  email: kotarusowjanya19@gmail.com
  organization: VFSTR Universtiy,Department of ACSE,Guntur,India
– sequence: 5
  givenname: Rajani
  surname: Alavala
  fullname: Alavala, Rajani
  email: alavalarajani2710@gmail.com
  organization: VFSTR Universtiy,Department of ACSE,Guntur,India
BookMark eNotzN1KwzAYgOEIeqBzdyCSG1jNl9_mUMvmCvUH3PlI0i9dYKbShsHuXkWP3vfouSGXecxIyD2wCoDZh7Zp35tXLWrOK864rBgDpS7I0hpbC8WENmDgmny0-YRzSYMrKQ-0HJCuY8RQ0gkzzjMdI926-UC7lJE-uRmPvxPHiW7SEWmbCw5TKmf6MuZUxulHuSVX0R1nXP53QXab9a7Zrrq357Z57FbJQlnJKKX0wUmuYpQA2qjeW2_Qg45BBW950MjB18b3PZjInO-FMYx7EWwdxILc_bEJEfdfU_p003kPTGtmQYlvwS1PVw
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICIPCN63822.2024.00155
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350367171
EndPage 905
ExternalDocumentID 10660915
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i91t-4f444bca425ff411675db9b7eb16fc5cb92c6e21b87bdd17f0abd37702b3c98c3
IEDL.DBID RIE
IngestDate Wed Sep 18 05:50:16 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i91t-4f444bca425ff411675db9b7eb16fc5cb92c6e21b87bdd17f0abd37702b3c98c3
PageCount 5
ParticipantIDs ieee_primary_10660915
PublicationCentury 2000
PublicationDate 2024-July-3
PublicationDateYYYYMMDD 2024-07-03
PublicationDate_xml – month: 07
  year: 2024
  text: 2024-July-3
  day: 03
PublicationDecade 2020
PublicationTitle 2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN)
PublicationTitleAbbrev ICIPCN
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8777801
Snippet This study outlines the value of file integrity and the effective role hashing plays in maintaining it. The goal of the study is to assess how well these...
SourceID ieee
SourceType Publisher
StartPage 901
SubjectTerms Baseline
Data security
Effectiveness
Hash line
Image processing
Integrity
Monitoring
Organizations
PowerShell
Protection
Reliability
Systematics
Title Investigating the Effectiveness of Hash Line Baseline for File Integrity Monitoring
URI https://ieeexplore.ieee.org/document/10660915
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ1NS8MwGMeD28mTihPfycFrZpOmaXJ1ODbBMXDCbiOvKkIn2l789D5JOx2C4K300pD0eUue3z8IXUknWSRTiOcyI5xSTzRk9iR4ymwumTUussP3MzF55HfLYtnB6omF8d6n5jM_jI_pLN-tbRO3ysDChYD4VvRQDyq3FtbqqF-aqevpaDofzeCHYpGwYlEWm0aEb-valBQ1xntotvle2yzyOmxqM7Sfv6QY_z2gfTT4AfTw_Dv0HKAdXx2ihy3NjOoJQ2aHW23izqHhdcAT_fGMof70-EYnFN1jyFrxGHwDniblCMjKcWvoccdvgBbj28VoQro7E8iLojXhgXNurAZLDIHHM5bCGWVK8Mgi2MIaxazwjBpZGudoGTJtXF6WGTO5VdLmR6hfrSt_jLDMHWQ7VgslHXjTQjmfSaeFgIqKBSFP0CBOyOqtVcVYbebi9I_3Z2g3Lkpqdc3PUb9-b_wFBPTaXKaF_AKDaaIt
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwGA06D3pSceJvc_Da2aRpmlwdjk63MnDCbqP5pSJ0ot3Fv94vaadDELyVXBqSfN97Sb73gtCVMIJ6ZUpkmYgjRoiNSmD2kbOE6kRQrYzXDo8Lnj-yu1k6a8XqQQtjrQ3FZ7bnP8NdvlnopT8qgwjnHPAt3URbAPxMNnKtVvdLYnk97A8n_QKWFPUaK-qNsYkX8a09nBJwY7CLitUfm3KR196yVj39-cuM8d9d2kPdH4kennyDzz7asNUBelhzzaieMHA73LgTtykNLxzOy49nDDtQi2_KIEa3GHgrHkB2wMPgHQG8HDeh7s_8umg6uJ3286h9NSF6kaSOmGOMKV1CLDrH_C1LapRUGeRk7nSqlaSaW0qUyJQxJHNxqUySZTFViZZCJ4eoUy0qe4SwSAzwHV1yKQzk01QaGwtTcg57Kuq4OEZdPyDzt8YXY74ai5M_2i_Rdj4dj-ajYXF_inb8BIXC1-QMder3pT0HeK_VRZjULzWqpX0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+5th+International+Conference+on+Image+Processing+and+Capsule+Networks+%28ICIPCN%29&rft.atitle=Investigating+the+Effectiveness+of+Hash+Line+Baseline+for+File+Integrity+Monitoring&rft.au=Jukuntla%2C+Amar&rft.au=Gutha%2C+Gayathri&rft.au=Palem%2C+Annjana&rft.au=Kotaru%2C+Sri+Lakshmi+Sowjanya&rft.date=2024-07-03&rft.pub=IEEE&rft.spage=901&rft.epage=905&rft_id=info:doi/10.1109%2FICIPCN63822.2024.00155&rft.externalDocID=10660915