15th Annual Computer Security Applications Conference
December 6-10, 1999
Phoenix, Arizona


Adding availability to log services of untrusted machines

Arianna Arona, arona@dsi.unimi.it
Danilo Bruschi, bruschi@dsi.unimi.it
Emilia Rosti, rosti@dsi.unimi.it

Dipartimento di Scienze dell'Informazione
Universita` degli Studi di Milano
Via Comelico 39/41, 20135 Milano -- Italy

Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from information tampering can be achieved using cryptographic functions that provide authenticity, integrity, and confidentiality. However, they cannot provide the prerequisite for any further information processing, i.e., information availability. In this case, fault tolerant strategies can be of great help improving information availability in case of accidental or deliberate deletion. In this paper we propose a system that increases log files availability in case of software deletion by reliably and efficiently distributing the logs on multiple independent machines. The proposed scheme is more efficient than simple replication, both from the storage space and the network bandwidth points of view. The proposed system has been implemented and its impact on performance has been measured. Since it operates as a postprocessor after log generation, the proposed system can be easily integrated with logging systems that provide various cryptographic functions for forensic purposes.