Development of a Cryptographically Secure Audit Trail System Leveraging Advanced Encryption Standard (Aes) and Rivest–Shamir–Adleman (Rsa) Algorithms
Development of a Cryptographically Secure Audit Trail System Leveraging Advanced Encryption Standard (Aes) and Rivest–Shamir–Adleman (Rsa) Algorithms
BY
SEPTEMBER, 2024
I
CERTIFICATION
……………………………………….. --------------------
Signature of Candidate Date
Ii
APPROVAL PAGE
This thesis was done by Okoh Christian Chidiebere and has been examined and
approved for the award of Masters of Science in the department of Computer
Science, Imo State University, Owerri.
………………………….. ………………………
Engr. Dr. Okorie Emeka Date
Supervisor
………………………….. ………………………
Prof. Osuagwu Oliver .E. Date
Head, Department of Computer Science
………………………….. ………………………
Prof. Dimejesi S.A. Date
Dean, Faculty of Natural and Applied Science
………………………….. ……………………..
External Examiner Date
iii
DEDICATION
I dedicate this thesis to God Almighty for his immeasurable mercy and divine
favor granted to me.
Iv
ACKNOWLEDGEMENTS
Firstly, let me express and return all thanks to our Almighty God, for his
mercies and endurance, I humbly extend a warmth appreciation to my
Supervisor Engr. Dr. Okorie Emeka, I want to also acknowledge the support of
my HOD Prof. Osuagwu Oliver .E., Our Departmental PG Coordinator Prof.
Iloka B.C., and my fellow M.Sc students in the department of Computer
Science, Tansian University Umunya, Anambra State. I extend appreciation to
my darling parents though deceased and wonderful siblings for their prayers and
support seeing me through.
V
TABLE OF CONTENT
Title Page i
Certification ii
Approval Page iii
Dedication iv
Acknowledgements v
Abstract vi-ix
CHAPTER ONE - INTRODUCTION
1.1 Background of Study 1-4
1.2 Statement of the Problem 4-5
Internal and external forces are actively compromising companies’ data (accidentally and
deliberately) and some of the most serious threat comes from current employees with
authorized access where some are opportunistically looking for extra money selling private
information or doing illegal activities. Special care should be taken to verify the integrity and
to ensure that sensitive data is adequately protected and one of the key activities for data loss
prevention is an audit. In order to be able to audit a system, it is important to have reliable
records of its activities. Several researchers have addressed the problem of audit trail security
using Genetic Algorithm, Statistical, Rule based approaches, neural networks, Immune
systems and Genetic programming and examined new paradigms in computer security, such
as applying evolutionary methods to security. With each passing day, the avoidance and
detection of threats to Computer Technology is becoming more and more difficult and with
the increasing dependence of critical data security systems, data integrity has been a serious
problem over the years in securing audit trail data. In this thesis, we present major studies in
security audit trail (audit log), reviewed the best symmetric and asymmetric encryption
algorithms and adapted the AES (symmetric) and RSA(Asymmetric) algorithms for the
proposed system. The system result showed that the proposed AES and RSA algorithm
guaranteed better data integrity of the audit trail data and to prevent employees from
compromising companies’ data.
CHAPTER ONE
1.0. INTRODUCTION
Today’s Computer systems are vulnerable to both abuse by insiders and penetration by
outsiders, as evidence by the growing number of incidents reported in the press (Teresa,
2015), as closing all security loopholes from today’s system is infeasible, and since no
combination of technologies can prevent legitimate users from abusing their authority in a
system, auditing is viewed as the last line of defense. To manage information securely, a
system must be able to detect information misuse. In secure systems, malicious
administrators, users or developers may be able to launch attacks that tamper with or leak
important information. Determining what information was compromised and who was
responsible not only enables administrators to stop further abuses, but in many instances,
have legal ramifications (Aaron, 2011). Moreover, a computer risk is the probability of an
event resulting in a loss. Risks and losses may include financial and personal losses, loss of
reputation and customer base, inability to function in a timely and effective manner, the
inability to grow, and the violation of the laws and government regulations. In systems where
the device owner is not the person who owns the secrets in the device, an audit mechanism is
essential to determine if there was any attempted fraud (Kundan and Kaul, 2013).
Several researchers have addressed the problem of audit trail security using Genetic
Algorithm, Statistical, Rule based approaches, neural networks, Immune systems and Genetic
programming (Pedro and Diaz, 2015). Some researchers examined new paradigms in
computer security, such as applying evolutionary methods to security (Ludovic, 1998;
Beghdad, 2015; Diaz and Hougen, 2015). With each passing day, the avoidance and
detection of threats to Computer Technology is becoming more and more difficult
(Harleman, 2011). Moreover, attacks are more sophisticated and Information Technology
security response is being stretched beyond current capabilities (Dave, 2012).
Every year, internal and external forces are actively compromising companies’ data
(accidentally and deliberately). According to DataInsider, 2017, some of the most serious
threat comes from current employees with authorized access. Some want to settle a score
while others are opportunistically looking for extra money selling private information or
doing illegal activities.
Moreover, the key challenge to building a successful, secure audit logging system is to
simultaneously protect the integrity of the audit log and control access to contents.
These challenges have led to a research trend aimed to a simplified representation of the
problem of security and data integrity of an audit trail system. However, how can we
guarantee better data integrityfor the safety of the audit trail from being misused?
Audit trails can provide a means to help accomplish several security-related objectives,
including individual accountability, reconstruction of events (actions that happen on a
computer system), intrusion detection, and problem analysis.
CHAPTER TWO
The need to identify such activities and to determine suspicious patterns are important
requirements for system security. In addition, an audit should be performed independently
and transparently, so that all relevant information is classified (Hawthorn, 2016). Every detail
of a source and entry of a document or transaction should be made based on a report or file.
Moreover, Audit trails should be developed as a normal part of the internal control systems.
Some systems can be acquired with the use of an automated audit log.
A lot of research has been carried out in developing and implementing new techniques
ranging from basic statistical methods to highly complex evolutionary methods for audit trail
data security. However, we limit our research to data integrity of an audit trail system and we
present some of the related works on security of an audit trail system.
Shubhangi, Shital, and Runali, 2015 identified different techniques and detection of different
contents in Database.They used the cryptographic hash algorithm to detect the tampering of a
Database. Consequently the Tiled Bitmap Forensic analysis algorithm helped to find at what
time and possibly finally why and who had tampered the Database. They used separate audit
log validator to observe and inspect the database along with the extra information and state of
the data.Forensic analysis detects in what time a crime has been identify and in this case the
tampering of a database.Such analysis activities determine when the tampering occurred, and
what data were altered. Their study was concerned of only detecting the database tampering
not about preventing tampering.
Kundan and Mishra, 2013 proposed a process mining based technique to evaluate audit trails
for security measures, which they recognized a particular user who logged in on a given
system. This was done by mining log files created by the system. This log contains
information related to the user access pattern. Their work was based on alpha algorithm to
support security efforts at various levels ranging from low-level intrusion detection to high-
level fraud prevention. Using data mining approach. They mined the log file and extracted the
user. To mine the log file will improve α algorithm to get better accuracy. However there was
lack of protecton of the audit trail information in the database for intruder to get access to the
audit trail data.
Pedro, Diaz, and Dean, 2016 proposedafitness function for doing misuse detection and
finding pseudo intrusions for audit trail log. They conjectured that every validation of the
vector I withtheAttack-Eventmatrix(AE∗I)fuzzysubsetof the observed vector OV is an
intrusion vector. They introduced the concept of the union operator and showed
experimentally how it improved the convergence of the algorithm in terms of number of
generations. They introduced the concept of the intrusion set and exclusive intrusions so the
algorithm disaggregates possible subsets of misuse of the system. However, a cryptographic
techniques is essential for the inegrity of the audit trail data.
Bhanu and Nalini, 2014 evaluated risks associated with security and privacy of audit logs
produced by reverse proxy server. They provided a two-phase approach for sharing the audit-
logs with users allowing finegrained access. They evaluated certain Identity-Based and
Attribute-Based Encryption schemes and provided detailed analysis on performance.
However, there is lack of oblivious search on encrypted audit logs along with computation on
data like analytics with monotonic and non-monotonic access structures and along with
predicate encryption.
Brent, Dirk, and Glenn, 2016described an approach for constructing searchable encrypted
audit logs which can be combined with any number of existing approaches for creating
tamper-resistant logs. In particular, they implemented an audit log for database queries that
uses hash chains for integrity protection and identitybased encryption with extracted
keywords to enable searching on the encrypted log. They presented a scheme in which they
used identity-based encryption to protect symmetric keys that are used to encrypt audit log
entries. Privileged audit escrow agents can create search capabilities that allow their bearer to
search the audit log for records matching certain keywords. They implemented their scheme
as a secure audit log for MySQL database queries. It turned out that the identitybased
encryption scheme they used introduced considerable overhead (although small enough to be
negligible in an interactive system), but it buys them security and convenience over
symmetric key based schemes. While the focus of their work so far have been to investigate
the searchability of the audit log, the implementation of advanced integrity protection
mechanisms to improve the overall security of the system is needed.
Bellare and Bennet, 1997 introduced a new security property which they called "forward
integrity" (FI) based on the generation of message authentication codes (MACs) model. The
goal is to prevent FI alteration or entering of information by the attacker, even when the log
records become available to the attacker who gained control of the entire system.In the MAC
system, if an attacker obtains the MAC key, he/she can forge all the registry entries. In the FI
system, the possession of the key at a particular point in time does not allow the attacker to
forge log entries from a previous to the current date. Thus, the attacker cannot change the
contents of the log. He/she can even delete entries, but spaces will be visible in the registry
and also the occasional transmission of the log to a remote system mitigates the effect of the
deletion of records.
Typically, MACs are used in a context of communication, where the sender and receiver
share a secret MAC key. The sender uses the MAC key to generate a message and attaches it
to the message; the receiver, who knows the MAC key, can restore Mac and accept as true
only those messages for which the regenerated MAC matches the transmitted MAC. The
MAC security model is the fact that it is computationally infeasible for an adversary-based
network that does not know the key to modify the MAC messages and MACs for the receiver
to accept them as true.Once the audit logs are simply messages that are read and checked
later on by a recipient and not (necessarily) over a network, it might simply attach MACs to
the audit log entries to protect them.
However, the MAC model fails when it does not send continuous logs to a remote device,
either by lack of or delay in transfers. Another vulnerability is in the fact that if an attacker
enters the system and obtains the MAC key, they will get control of the logs.
Pandey and Mustafa, 2012 proposed a checklist for the implementation of the ‘Event Log and
Audit Trials’ requirements. According to the authors, the system will be stronger if it satisfies
all or most of the checklist items given in the checklist. A detailed discussion of ‘Event Log
and Audit Trials’ was given for the security assurance of the software. Being prescriptive in
nature, the checklist can be easily implemented and it may reassure the integration of the
security in the software from inception itself. However, a strong validation and
standardization of checklist on a large sample size and the weight of each attribute given in
the checklist to produce more accurate result wasn’t considered.
Internal and external forces are actively compromising companies’ data (accidentally and
deliberately). According to DataInsider, 2017, some of the most serious threat comes from
current employees with authorized access.
There exist many systems that have tried to solve the problem of data integrity. The auditing
can be performed in two ways viz. Private and Public (Chen and Chen, 2012). In Private
Auditability, the client is responsible to verify the data. No one else except the client can
question the server regarding the data integrity, whereas, Public Auditability is more
convenient and preferred over Private Auditability because it allows a third party to perform
integrity verification on behalf of client. The client is not solely responsible for it and so it
largely reduces client’s burden.
Recently, much work has been done in the area of data integrity. Majority of them focus on
the integrity verification of data stored in the cloud.
Deswarte, Quisquater, and Saidane, 2016 used RSA based hash function for verification of
the file stored at the remote server. Using this scheme, it is possible for the client to perform
multiple challenges using the same metadata. Disadvantage: The limitation of this scheme
lies in the computational complexity at the server which must exponentiate all the blocks in
the file.
Schwarz and Miller, 2016proposed a technique using which the data stored remotely across
multiple sites can be ensured. The scheme made use of algebraic signature. In this, a function
is used to fingerprint the file block and then verifies if the signature of the parity block is
same as the signature of block. The main disadvantage of this scheme is that the computation
complexity at client side and server side takes place at the cost of linear combination of file
blocks and also the security of this scheme remains unclear.
Ateniese, 2007were the first in considering the concept of Public Auditing for ensuring
possession of files at untrusted servers. For auditing of outsourced data, the scheme utilizes
RSA based homomorphic tags, thus achieving public auditing. In this protocol, the client
need to verify if the server has retained file data without actually retrieving the data from
server and without having the server access the entire file. By sampling random sets of blocks
from the server, the model generates probabilistic proofs of possession by sampling random
sets of blocks. This reduces I/O cost drastically. The Provable Data Possession (PDP) model
for remote data checking supports large data sets in widelydistributed storage systems. It is
provably-secure scheme for remote data checking. The drawback is an overhead of
generating metadata is imposed on client. No support provided for dynamic auditing and it
requires more than 1kilo-byte of data for a single verification.
A scheme called, “Proofs of Retrievability” (POR), proposed by Juel and Pors, 2007 focused
on static archival of large files. In order to ensure data possession and retrievability, it makes
use of spot checking and error correcting codes. Some special blocks called as “sentinels” are
randomly embedded into the file F for detection. Further, the file is encrypted out in order to
protect the position of these sentinel blocks. POR scheme cannot be used for public
databases; it is suitable only for confidential data. The drawbacks are that the dynamic
updation is prevented due to the introduction of sentinel nodes, number of queries clients
used is fixed priori, preprocessing of each file is needed prior to storage at the server, the
scheme cannot be used for public databases and can only be used for confidential data and
does not support Public Auditability, i.e., it supports only two-party auditing, which is not
efficient because neither the client nor the cloud service provider can give assurance to
provide balance auditing.
Poonam and Bharat, 2014 proposed a secure and efficient AES based system for auditing
user data stored at untrusted server. The system guarantees data the achievement of data
integrity and availability. The system supports Public Auditing by making use of TPA and
Privacy Preserving by not leaking the data to TPA during integrity verification process. By
frequent integrity checking, the system assures data possession at remote server. However,
the integrity of the data in terms of eaves dropping and storing of symmetric key securely
over an untrusted server wasn’tconsidered.
CHAPTER THREE
3.1.1.2. Blowfish
Blowfish is a symmetric fast cipher key, designed in 1993 for different length key from32
bits to 448 bits used in general. It uses 64-bit block size and slow key changes occur. The
algorithm exists into two parts: a keyexpansion part for conversion of key and a data-
encryption part for existing rounds. Key expansion converts a key of at most 448 bits into
several sub key arrays totaling 4168 bytes. Data encryption occurs via a 16-round Fiestel
network. Each round consists of a key dependent permutation, a key and data-dependent
substitution. All operations are XORs and additions on 32-bit words. The only additional
operations are four indexed array data lookups per round.
3.1.1.3. TwoFish
Twofish is also a symmetric key block cipher having fiestel structure and it uses different key
sizes of 128, 192 and 256 bits with block size of 128 bits and there are 16 rounds of
encryption algorithm. It is also developed and explained by bruceschneier in 2019. Twofish
also uses block ciphering like Blowfish. It is efficient for software that runs in smaller
processor (smart cards) and embedding in hardware. It allows implementers to customize
encryption speed, key setup time, and code size to balance performance. Twofish has not
been patented and the reference implementation due to that it is license-free and freely
available for use. Twofish encryption algorithm also provides good level of security but it
lacks in encryption speed as compared to blowfish.
1. Throughput performance: It is the higher rate of production or maximum rate at which data
can be processed which belong to may be delivered over a physical or logical link. It may be
affected by various factors such as medium, available processing power of the system,
components and end-user behavior.
2. Key Length Size: In most cryptographic function, the key length is important security
parameters andkey management is the important factor to show how the data is encrypted.
The symmetric algorithm uses a different key length which is longer than asymmetric
logarithm. So, the key management is a huge aspect in encryption processing for control
operation of the cipher.
3. Encryption and Decryption Speed: In many real-time applications, the encryption and
decryption algorithms are fast sufficient which depends on the register size of the CPU to
meet real time requirements.
4. Encryption Ratio: The encryption ratio is the measurement of the total number of data that
is to throughput of the encryption algorithms is calculated by dividing the total plaintext in
Megabytes encrypted on total encryption time for each algorithm. Thus, if throughput
increased the power consumption is decrease and gives more long life of the system
component.
5. Encryption and Decryption Time: The time given by algorithms totally depends on the
speed of the processor and algorithm complexity. Less time algorithm improves the entire
operation of the processor. For better encryption and decryption, computation of time factor
is essential by the algorithm.
For asymmetric key algorithm, it requires two separate keys, one of which is secret (or
private) and one of which is public. Although different, the two parts of this key pair are
mathematically linked. The public key is used to encrypt plaintext or to verify a digital
signature, whereas the private key is used to decrypt cipher text or to create a digital
signature, comparing to symmetric key algorithm, asymmetric key algorithm does not have
the problem of key transport, but it is computationally costly compared with symmetric key
algorithm. Moreover, the asymmetric key encryptions algorithms are mathematically
complex, which introduces high CPU overhead and is therefore extremely slow when
encrypting data. This algorithm is therefore only intended to encrypt small amounts of data.
In this project, we have reviewed both well-known symmetric and asymmetric algorithm and
exposed their drawbacks. We combined both AES and RSA encryption algorithms to get the
best of the data integrity and efficiency of the audit trail, which are the speed of AES and the
security of RSA encryption algorithm.
The symmetrically encrypted data and the asymmetrically encrypted symmetric key are both
sent to the administrator. The administrator asymmetrically decrypts the symmetric key using
his or her private key (RSA private key). The symmetric key is the used to decrypt the actual
data and the information from the database is then readable to the administrator to check all
audit trailactivities.
CHAPTER FOUR
4.1. Unified Modeling Language (UML) Models of the audit trail system
The Unified Modeling Language (UML) is a standardized general-purpose modeling
language in the field of object-oriented software engineering. The standard is managed, and
was created by the Object Management Group (OMG). It was first added to the list of OMG
adopted technologies in 1997, and has since become the industry standard for modeling
software-intensive systems (Moor and Deek, 2016).UML represents a collection of
engineering practices that has proven successful in the modeling of large and complex
software systems. It uses mostly the communication of project designs, the exploration of
potential designs and in the validation of the resulting design. In this project, we used the use
case, class diagram, object diagram and sequence diagram to show the functional
specification of our audit trail system.
Audit class Activity: The audit class contains the employee ID, registration time, logged in
time, logged out time and activities attributes of the audit trail system. Here, the administrator
can view all audit logs and check for legal and illegal activities.
We have shown how the system test was conducted and we ensure that we have met our aim
in providing to the solution of data integrity and efficiency of an audit trail system.
CHAPTER FIVE
In conclusion, AES, which is a symmetric algorithm is usually high speed and low RAM
requirements, but because it is the same key for both encryption and decryption, it is a big
problem of key transport from encryption side (sender) to decryption side (receiver).
Moreover, for RSA, it does not have the problem of key transport but it is computationally
costly compared to AES and also slow when encrypting large amount of data. We designed
the audit trail system using C-sharp, ASP.Net, CSS and JavaScript and in the system design,
we combined both AES and RSA encryption algorithm to get the best of the data integrity
and efficiency of the audit trail system, which are the speed and large data encryption using
AES algorithm and the better security of the AES key using RSA encryption algorithm. We
showed that the system produced better result for ensuring security of the audit trail data.
References
Aaron, B. (2011). Analyzing Audit Trails in the Aeolus security Platform. Massachusetts Institute of
Technology.
Ateniese, G. (2007). Provable Data Possession at Untrusted Stores. Proc. 14th ACM Conf. computer
and comm. security.
Beghdad, R. (2004). Modelling and solving the intrusion detection problem in computer networks.
Computers and Security. Retrieved June 21, 2017, from Sciencedirect.com:
http://www.sciencedirect.com/science/article/pii/S0167404804001725
Bellare, M., & S., B. (1997). Forward secure audit integrity for logs. Dept. of computer science and
engineering, university of carlifornia at san Deigo.
Bhanu, P. G., & Nalini, N. (2014). Improved Security of Audit Trail Logs in Multi-Tenant Cloud Using
ABE Schemes. International Journal of Advanced Computer Science and Applications, Volume
5(issue 11), page 115-120.
Bibhudendra, A., Sambit, K. S., Saroj, K. P., Sarat, K. P., & Ganapati, P. (2009). Cryptosystem and its
application to image encryption. International conference on advances in computing,
control, and teleommunication technologies., page 720-724.
Brent, R. W., Dirk, B., Glenn, D., & D., K. S. (2006). Building an Encrypted and Searchable Audit Log.
princeton: Palo Alto Research center.
Chen, L., & Chen, H. (2012). Ensuring dynamic data integrity and public auditing for cloud storage.
International onference on computer science and service system.
Dave, S. (2012). Wheb breaches Happen: Top five questions to prepare for. Sans White Paper.
Deswarte, Y., Quisquater, J., & Saidane, A. (2003). Remote integrity checking. In Proc. of conference
on integrity and internal Control in information systems.
Diaz, G. P., Hougen, D., & F. (2005). Analysis and mathematical justification of a fitness function used
in an intrusion detection system. in the proceedings of the 2005 conference on Genetic and
evolutionary computation.
Elmasri, R., & Shamkant, B. N. (2004). FUNDAMENTALS OF DATABASE SYSTEMS 4th ed. Copyright ©
2004 Pearson Education, Inc. ISBN 0-321-12226-7.Pg 735.
Gaurav, Y., & Aparna, M. (2017). A Comparative Study of Performance Analysis of Various Encryption
Algorithms. International Conference On Emanations in Modern Technology and Engineering
(ICEMTE-2017), Volume 5(Issue 3), page 70-73.
Harsh, M., & Zahid, A. (2015). Analysis In Symmetric And Asymmetric Cryptology Algorithm.
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),
Volume 4(Issue 1), page 44-46.
Kundan, K. M., & Kaul, R. (2013, Oct 1). Audit Trail Based on Process Mining and Log. International
Journal of Recent Development in Engineering and Technology, Volume 1, Issue, Website:
www.ijrdet.com (Online),.
Kundan, K., & Mishra, R. K. (2013). Audit Trail Based on Process Mining and Log. International
Journal of Recent Development in Engineering and Technology, Volume 1(Issue 1), pages 12-
15.
Ludovic, M. (1998). A Genetic algorithm as an alternative tool for security audit trails analysis.
Louvain-la-Neuve, Belgium: in the proceedings of the first international workshop on Recent
Advances in intrusion Detection.
Mourad, D. (2013). Security Audit Trail Analysis Using Harmony Search Algorithm . Faculty of
Electronics and Computer Science, Laboratory LSI, USTHB BP 32 16111 El Alia, Bab-Ezzouar,
Algiers, Algeria.
Pandey, S. K., & Mustafa, K. (2012). SECURITY ASSURANCE THROUGH EFFICIENT EVENT LOG AND
AUDIT TRIALS. Journal of Global Research in Computer Science, Volume 3(issue 1), page 27-
30.
Parry, G. M., & Santosh, K. (2014). Genetic Algorithms in Intrusion Detection Systems: A Survey.
International Journal of Innovation and Applied Studies, Volume 5, page 233-240.
Pedro, A., Diaz, G., & Dean, F. H. (2006). A Genetic Algorithm Approach for Doing Misuse Detection in
Audit Trail Files. Robotics, Evolution, Adaptation, and Learning Laboratory (REAL Lab) School
of Computer Science, University of Oklahoma Norman, OK, USA.
Peterson, N. J., Burns, R., Ateniese, G., & Stephen., B. (2007). Design and Implementation of Veri
able fi Audit Trails for a Versioning File System. Proceeding FAST '07 Proceedings of the 5th
USENIX conference on File and Storage Technologies in.
Poonam, M. P., & Bharat, T. (2014). Improving Data Integrity for Data Storage Security in Cloud
Computing. Poonam M. Pardeshi et al, / (IJCSIT) International Journal of Computer Science
and Information Technologies, Volume 5(issue 5), page 6680-6685.
Ricardo, C. C., Isabel, B., & Alberto, F. (2012). Analysis of the quality of Hospital information systems
audit trails. BioMed Central.
Schwarz, T., & Miller, E. L. (2006). Using algebraic signatures to check remotely administered
storage. In proceedings of ICDCS. IEEE computer society.
Shubhangi, K., Shital, G., Runali, J., & V., N. (2015). Forensic Analysis of Database using Secure Audit
Log. IJLTEMAS, Volume 4(issue 2), pages 89-91.
Simon et al. (2008, Apri). An Auditing System based on analysis of log records. Informatics
Department Universidade Federal do Paraná (UFPR). Regional School Database (ERBD'2008),
Florianopolis-SC,.
Teresa, F. L. (2015). Automated Audit Trail Analysis and Intrusion Detection: A survey. Menlo Park:
SRI International, Computer Science Laboratory.
Uma, K., Karthik, G., & Vishnu, P. (2017). A comparative analysis of symmetric and asymmetric key
cryptography. Journal of chemical and Pharaceutical Sciences, Volume 10(1), pages 324-326.
Uma, K., Karthik, G., & Vishnu, P. K. (2017). A comparative analysis of Symmetric and Asymmetric key
cryptography. Journal of Chemical and Pharmaceutical Sciences, Volume 10(issue 1), page
324-326.
Xu et al. (2005, November ). A PKI Based Secure Audit Web In IASTED Communications, Network and
Information and CNIS, Phoenix, USA,.
APPENDIX 1
APPENDIX 2