Abstract:
A cyber attack necessitates preventing the spread of damage by quickly responding to the incident. To investigate the situation accurately, we must collect, manage, and m...Show MoreMetadata
Abstract:
A cyber attack necessitates preventing the spread of damage by quickly responding to the incident. To investigate the situation accurately, we must collect, manage, and maintain log data on devices related to the system. We herein propose a distributed management method for logs using a blockchain scheme. The blockchain scheme has the following two features. One makes managed data tamper resistant. The other makes access to the same data possible with multiple terminals, thereby increasing access availability. A log management method that adapts these features can provide log data that are guaranteed to be complete when needed. This paper presents our evaluation of the feasibility of our method in a prototype.
Date of Conference: 04-06 January 2020
Date Added to IEEE Xplore: 23 March 2020
ISBN Information: