A Practical Low-Cost Security Solution for Log
Management and File Integrity Monitoring
Lei Chen
1
, Ming Yang
2
, Hayden Wimmer
3
, Brittany Wilbert
4
{lchen@georgiasouthern.edu
1
, MYang8@kennesaw.edu
2
, HWimmer@georgiasouthern.edu
3
,
BMW005@shsu.edu
4
}
Department of Information Technology, Georgia Southern University, Statesboro, Georgia, USA
1,3
,
Department of Information Technology, Kennesaw State University, Kennesaw, Georgia, USA
2
,
Google, Mountain View, California, USA
4
Abstract. Log management and file integrity are among the most critical security controls
in protecting valuable business data assets against internal and external security attacks.
Despite the importance of these controls, many businesses, especially smaller ones, do not
practically implement the controls due to reasons including cost and personnel. In this
research, we propose a framework, utilizing low cost or free-of-cost tools, and offer
guidance for efficient log management and integrity monitoring. A detailed list of relevant
hardware, software, and tools as well as their corresponding costs is provided to assist
businesses in strategic security planning.
Keywords: security, log management, file integrity monitoring, low-cost, forensics.
1 Introduction
A Data Breach Investigation report by Verizon indicated that a litter over half of small
businesses were affected by malware and almost three quarters were affected by hacking
incidents in 2019 [1]. Among the various reasons to this situation are the two critical difficulties
that small businesses are facing: cost and personnel. Compared to mid-size and large-scale
businesses, small businesses typically do not have sufficient funds or personnel to plan,
implement, test or evaluate the security of their systems and networks which potentially leads
to critical data breaches as well as system and network malfunctions detected long after they
occurred [2][3][4]. Therefore, there is an acute need for developing a framework with a set of
recommended hardware, software, and tools for log management and file integrity at low cost
for businesses which cannot afford large-scale security solutions.
To answer the increasing demand for low-cost yet efficient security solutions for small
businesses, our research proposes a framework solution meeting their needs. While security
requires preventative, detective, and responsive mechanisms in multiple layers, such as
firewalls, antivirus and antimalware software, and intrusion detection and prevention systems
(IDS/IPS), our interest in this study focuses on the log management and file integrity. The
rationale is that, despite the fact that many intrusions (appeared as changes to files and logs) can
be potentially discovered via log management and file integrity checks, they still occurred in an
environment protected by firewalls and other security mechanisms. Most small businesses either
have not realized its importance or have not found a sound solution meeting their budget. In the
EAI MOBIMEDIA 2020, August 27-28, Harbin, People's Republic of China
Copyright © 2020 EAI
DOI 10.4108/eai.27-8-2020.2294894