Comparison of File Integrity Monitoring (FIM) techniques for small business networks

Brittany Wilbert, Lei Chen

Research output: Contribution to book or proceedingConference articlepeer-review

1 Scopus citations

Abstract

File Integrity Monitoring (FIM) can provide the ability to track changes which have been made to an operating system or software as a result of malicious behavior. For small business environments, the need for these tools is present; however, because of the difficulty of managing such software many businesses may ignore using them. This paper will discuss how a small business should create criteria for comparing file integrity monitoring tools in order to locate the most effective product for their environment.
Original languageEnglish
Title of host publication5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479926961
DOIs
StatePublished - Nov 19 2014
Event5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014 - Hefei, China
Duration: Jul 11 2014Jul 13 2014

Publication series

Name5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014

Conference

Conference5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
Country/TerritoryChina
CityHefei
Period07/11/1407/13/14

Scopus Subject Areas

  • Computer Networks and Communications

Keywords

  • auditing
  • log file integrity monitoring
  • log management
  • small business environments

Fingerprint

Dive into the research topics of 'Comparison of File Integrity Monitoring (FIM) techniques for small business networks'. Together they form a unique fingerprint.

Cite this