Font Size: a A A

Based On Of Encfs The Log Backup System Design And Realization

Posted on:2011-08-29Degree:MasterType:Thesis
Country:ChinaCandidate:Q H SunFull Text:PDF
GTID:2208360308465785Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development and the popularization of computer network technology, computer technology penetrates every aspect of people's life, accompanied by a growing number of illegal attacks, which is a serious impact on the life of people, so the security of the computer network is drawing more and more people's attention and concern. Computer systems log mainly provides information reports of computer system and network status, and network intruders often destruct the operation records of the attacked system by removing or tampering with the system log, to prevent system administrators and professionals from tracking, auditing and obtaining evidence, therefore, computer system and network's security is directly related to system logs'security.In order to solve security issues of the system log, the usual solution is: to make real-time backup for the system log in a machine outside of the protected system. Currently, there are many methods of system log backup, all which have some shortcomings: a large performance overhead or need, or need to reduce the safety of the logs backup after network transmission. Because of the issues in stored procedure such as Rights Management, the log files also are at risk.Encrypted Filesystem has been widely used in the security of data storage in recent years, for facing the security issues of the current system log backup and storage, in this paper we proposes a system model based on encrypted file system log backup. Using the system log tools to back up the system log and using encrypted file system for secure storage of backup logs, can avoid risks brought in by log data off-site storage during the transfer process and storage. While enhancing system Log security, it can save a lot of system overhead and hardware resources, be more convenient in the follow-up log analysis, and also encrypt and store system files that can guarantee the integrity of backup data. In this paper, we describe the whole system as the following aspects: in-depth analysis of linux system log technology, analyzing and describing its developing status, describing the technology to ensure current system log safety and problems of the technology, describing the development of encrypted file systems, selecting the appropriate encrypted file system such as encfs by comparing the performance and expenses etc., and analyzing the linux file system architecture and fuse system that are involved in the paper. Finally, we propose a log backup system model based on encfs by analysis.
Keywords/Search Tags:Log Security, Computer Forensics, Encfs, Fuse, Linux
PDF Full Text Request
Related items