A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring Lei Chen 1 , Ming Yang 2 , Hayden Wimmer 3 , Brittany Wilbert 4 {lchen@georgiasouthern.edu 1 , MYang8@kennesaw.edu 2 , HWimmer@georgiasouthern.edu 3 , BMW005@shsu.edu 4 } Department of Information Technology, Georgia Southern University, Statesboro, Georgia, USA 1,3 , Department of Information Technology, Kennesaw State University, Kennesaw, Georgia, USA 2 , Google, Mountain View, California, USA 4 Abstract. Log management and file integrity are among the most critical security controls in protecting valuable business data assets against internal and external security attacks. Despite the importance of these controls, many businesses, especially smaller ones, do not practically implement the controls due to reasons including cost and personnel. In this research, we propose a framework, utilizing low cost or free-of-cost tools, and offer guidance for efficient log management and integrity monitoring. A detailed list of relevant hardware, software, and tools as well as their corresponding costs is provided to assist businesses in strategic security planning. Keywords: security, log management, file integrity monitoring, low-cost, forensics. 1 Introduction A Data Breach Investigation report by Verizon indicated that a litter over half of small businesses were affected by malware and almost three quarters were affected by hacking incidents in 2019 [1]. Among the various reasons to this situation are the two critical difficulties that small businesses are facing: cost and personnel. Compared to mid-size and large-scale businesses, small businesses typically do not have sufficient funds or personnel to plan, implement, test or evaluate the security of their systems and networks which potentially leads to critical data breaches as well as system and network malfunctions detected long after they occurred [2][3][4]. Therefore, there is an acute need for developing a framework with a set of recommended hardware, software, and tools for log management and file integrity at low cost for businesses which cannot afford large-scale security solutions. To answer the increasing demand for low-cost yet efficient security solutions for small businesses, our research proposes a framework solution meeting their needs. While security requires preventative, detective, and responsive mechanisms in multiple layers, such as firewalls, antivirus and antimalware software, and intrusion detection and prevention systems (IDS/IPS), our interest in this study focuses on the log management and file integrity. The rationale is that, despite the fact that many intrusions (appeared as changes to files and logs) can be potentially discovered via log management and file integrity checks, they still occurred in an environment protected by firewalls and other security mechanisms. Most small businesses either have not realized its importance or have not found a sound solution meeting their budget. In the EAI MOBIMEDIA 2020, August 27-28, Harbin, People's Republic of China Copyright © 2020 EAI DOI 10.4108/eai.27-8-2020.2294894