Credible security log management system in communication network based on process management and control
A communication network and process management technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as lack of security measures, non-compliance with security procedures or system configuration, and achieve the effect of ensuring security and privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] Below is further detailed description of the present invention according to accompanying drawing and example:
[0026] Existing threat models do not consider insider attacks and collusion attacks between log generators and log servers. The threat model of the present application integrates and extends existing threat models to protect log files from cyber-attacks in the environment of public communication network operators. For example, one possible threat is that a log generator intentionally sends modified log messages, or, with the active involvement of a log server administrator, intentionally modifies stored logs after they are stored to the log server.
[0027] The threat model of this application assumes that all entities involved in the logging process are semi-trusted, including log generators and log servers that store log files. As long as the attacker does not have access to the keys used, the chances of an attacker decrypting a message or forging a signatu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


