Investigating the Effectiveness of Hash Line Baseline for File Integrity Monitoring
This study outlines the value of file integrity and the effective role hashing plays in maintaining it. The goal of the study is to assess how well these techniques make use of PowerShell's capabilities to monitor and protect important files in a system's file manager. It analyses the effe...
Saved in:
Published in | 2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN) pp. 901 - 905 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
03.07.2024
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/ICIPCN63822.2024.00155 |
Cover
Loading…
Abstract | This study outlines the value of file integrity and the effective role hashing plays in maintaining it. The goal of the study is to assess how well these techniques make use of PowerShell's capabilities to monitor and protect important files in a system's file manager. It analyses the effectiveness of the Baseline and Hash line in File Integrity Monitoring to see whether the approach can be used to improve file security. This study seeks to provide confidentiality, integrity, and availability to the files as a comprehensive integrity solution for all files in a system simultaneously. The CIA triad is emphasized in the findings as being fundamental to file management. By applying these concepts using PowerShell-based File Integrity Management, this aims to develop a cohesive integrity solution that can simultaneously secure all files on a system. This comprehensive strategy improves complete file security by protecting against internal and external weaknesses. The research discusses how PowerShell-driven FIM techniques might strengthen file security. This provides important insights towards creating comprehensive, reliable solutions for preserving file integrity across several systems by concentrating on the CIA trio. |
---|---|
AbstractList | This study outlines the value of file integrity and the effective role hashing plays in maintaining it. The goal of the study is to assess how well these techniques make use of PowerShell's capabilities to monitor and protect important files in a system's file manager. It analyses the effectiveness of the Baseline and Hash line in File Integrity Monitoring to see whether the approach can be used to improve file security. This study seeks to provide confidentiality, integrity, and availability to the files as a comprehensive integrity solution for all files in a system simultaneously. The CIA triad is emphasized in the findings as being fundamental to file management. By applying these concepts using PowerShell-based File Integrity Management, this aims to develop a cohesive integrity solution that can simultaneously secure all files on a system. This comprehensive strategy improves complete file security by protecting against internal and external weaknesses. The research discusses how PowerShell-driven FIM techniques might strengthen file security. This provides important insights towards creating comprehensive, reliable solutions for preserving file integrity across several systems by concentrating on the CIA trio. |
Author | Alavala, Rajani Palem, Annjana Jukuntla, Amar Kotaru, Sri Lakshmi Sowjanya Gutha, Gayathri |
Author_xml | – sequence: 1 givenname: Amar surname: Jukuntla fullname: Jukuntla, Amar email: ja_acse@vignan.ac.in organization: VFSTR Universtiy,Department of ACSE,Guntur,India – sequence: 2 givenname: Gayathri surname: Gutha fullname: Gutha, Gayathri email: gayathrichowdary1936@gmail.com organization: VFSTR Universtiy,Department of ACSE,Guntur,India – sequence: 3 givenname: Annjana surname: Palem fullname: Palem, Annjana email: palemannjana@gmail.com organization: VFSTR Universtiy,Department of ACSE,Guntur,India – sequence: 4 givenname: Sri Lakshmi Sowjanya surname: Kotaru fullname: Kotaru, Sri Lakshmi Sowjanya email: kotarusowjanya19@gmail.com organization: VFSTR Universtiy,Department of ACSE,Guntur,India – sequence: 5 givenname: Rajani surname: Alavala fullname: Alavala, Rajani email: alavalarajani2710@gmail.com organization: VFSTR Universtiy,Department of ACSE,Guntur,India |
BookMark | eNotzN1KwzAYgOEIeqBzdyCSG1jNl9_mUMvmCvUH3PlI0i9dYKbShsHuXkWP3vfouSGXecxIyD2wCoDZh7Zp35tXLWrOK864rBgDpS7I0hpbC8WENmDgmny0-YRzSYMrKQ-0HJCuY8RQ0gkzzjMdI926-UC7lJE-uRmPvxPHiW7SEWmbCw5TKmf6MuZUxulHuSVX0R1nXP53QXab9a7Zrrq357Z57FbJQlnJKKX0wUmuYpQA2qjeW2_Qg45BBW950MjB18b3PZjInO-FMYx7EWwdxILc_bEJEfdfU_p003kPTGtmQYlvwS1PVw |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICIPCN63822.2024.00155 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350367171 |
EndPage | 905 |
ExternalDocumentID | 10660915 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i91t-4f444bca425ff411675db9b7eb16fc5cb92c6e21b87bdd17f0abd37702b3c98c3 |
IEDL.DBID | RIE |
IngestDate | Wed Sep 18 05:50:16 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i91t-4f444bca425ff411675db9b7eb16fc5cb92c6e21b87bdd17f0abd37702b3c98c3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_10660915 |
PublicationCentury | 2000 |
PublicationDate | 2024-July-3 |
PublicationDateYYYYMMDD | 2024-07-03 |
PublicationDate_xml | – month: 07 year: 2024 text: 2024-July-3 day: 03 |
PublicationDecade | 2020 |
PublicationTitle | 2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN) |
PublicationTitleAbbrev | ICIPCN |
PublicationYear | 2024 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8777801 |
Snippet | This study outlines the value of file integrity and the effective role hashing plays in maintaining it. The goal of the study is to assess how well these... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 901 |
SubjectTerms | Baseline Data security Effectiveness Hash line Image processing Integrity Monitoring Organizations PowerShell Protection Reliability Systematics |
Title | Investigating the Effectiveness of Hash Line Baseline for File Integrity Monitoring |
URI | https://ieeexplore.ieee.org/document/10660915 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ1NS8MwGMeD28mTihPfycFrZpOmaXJ1ODbBMXDCbiOvKkIn2l789D5JOx2C4K300pD0eUue3z8IXUknWSRTiOcyI5xSTzRk9iR4ymwumTUussP3MzF55HfLYtnB6omF8d6n5jM_jI_pLN-tbRO3ysDChYD4VvRQDyq3FtbqqF-aqevpaDofzeCHYpGwYlEWm0aEb-valBQ1xntotvle2yzyOmxqM7Sfv6QY_z2gfTT4AfTw_Dv0HKAdXx2ihy3NjOoJQ2aHW23izqHhdcAT_fGMof70-EYnFN1jyFrxGHwDniblCMjKcWvoccdvgBbj28VoQro7E8iLojXhgXNurAZLDIHHM5bCGWVK8Mgi2MIaxazwjBpZGudoGTJtXF6WGTO5VdLmR6hfrSt_jLDMHWQ7VgslHXjTQjmfSaeFgIqKBSFP0CBOyOqtVcVYbebi9I_3Z2g3Lkpqdc3PUb9-b_wFBPTaXKaF_AKDaaIt |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwGA06D3pSceJvc_Da2aRpmlwdjk63MnDCbqP5pSJ0ot3Fv94vaadDELyVXBqSfN97Sb73gtCVMIJ6ZUpkmYgjRoiNSmD2kbOE6kRQrYzXDo8Lnj-yu1k6a8XqQQtjrQ3FZ7bnP8NdvlnopT8qgwjnHPAt3URbAPxMNnKtVvdLYnk97A8n_QKWFPUaK-qNsYkX8a09nBJwY7CLitUfm3KR196yVj39-cuM8d9d2kPdH4kennyDzz7asNUBelhzzaieMHA73LgTtykNLxzOy49nDDtQi2_KIEa3GHgrHkB2wMPgHQG8HDeh7s_8umg6uJ3286h9NSF6kaSOmGOMKV1CLDrH_C1LapRUGeRk7nSqlaSaW0qUyJQxJHNxqUySZTFViZZCJ4eoUy0qe4SwSAzwHV1yKQzk01QaGwtTcg57Kuq4OEZdPyDzt8YXY74ai5M_2i_Rdj4dj-ajYXF_inb8BIXC1-QMder3pT0HeK_VRZjULzWqpX0 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+5th+International+Conference+on+Image+Processing+and+Capsule+Networks+%28ICIPCN%29&rft.atitle=Investigating+the+Effectiveness+of+Hash+Line+Baseline+for+File+Integrity+Monitoring&rft.au=Jukuntla%2C+Amar&rft.au=Gutha%2C+Gayathri&rft.au=Palem%2C+Annjana&rft.au=Kotaru%2C+Sri+Lakshmi+Sowjanya&rft.date=2024-07-03&rft.pub=IEEE&rft.spage=901&rft.epage=905&rft_id=info:doi/10.1109%2FICIPCN63822.2024.00155&rft.externalDocID=10660915 |