Implementation of a File Integrity Check System

Contributed by Don Mosley

The area of real-time Intrusion Detection and Prevention utilizing intelligent routers or various network attached appliances has received much press in the last few years. Should any of these defenses provide less than 100% effective coverage the user will be left unaware of any 'mischief' that might have gotten through. There is still a need for non real-time scanning of system files to determine any unauthorized modifications. This type of audit is often the only effective way to spot malicious activity originating from inside the enterprise network. This paper will outline mechanisms and practices for effective file integrity checking.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet