Solved

How can I monitor file integrity of thousands of digital library resources?

Posted on 2011-02-24
5
346 Views
Last Modified: 2012-05-11
I work the UC Berkeley in the Library Systems Office.  Our main purpose is to host digital collections and provide end users with the tools to create them and the storage to place the files.  After 20 years of host these types of projects and several server changes and file moves we have come to the realization that we need to be able to monitor all of these files to make sure that they don't become corrupt and if they do we need to know so we can replace the corrupted file with a previous version.

Does anyone know of an open-source solution to this problem?  Any and all help is appreciated!
0
Comment
Question by:rump0054
  • 2
  • 2
5 Comments
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 34974606
'md5sum' http://en.wikipedia.org/wiki/Md5sum is frequently used and as the article notes, it is part of many operating systems.  The MD5 sum is often found on web sites for files to be downloladed so you can verify your downloads.  There is also sha1sum http://en.wikipedia.org/wiki/Sha1sum .
0
 

Author Comment

by:rump0054
ID: 34974699
I did do a application planning phase for this project and I was planning on using MD5 so it's good to hear that others agree that MD5 is appropriate for this purpose.

My main request is if anyone knows of any open source solution, something like Tripwire for example, so I wouldn't have to actually create the application myself.

BTW: The reason I list Tripwire but planning on using it is that it seems to be overkill for what my simple needs are but if someone has experience with it that shows otherwise I could just give that another try as well...
0
 
LVL 2

Accepted Solution

by:
Hapexamendios earned 50 total points
ID: 34981997
Hi rump0054,

I sense Tripwire comes up because whilst what you're essentially looking at is File Integrity Monitoring for a support/service reason, whereas it's more commonly undertaken for security reasons.

Tripwire would do, as would OSSEC (a Host-based Intrusion Detection System), in that they contin the existing logic for performing checks against MD5 or SHA-1 checksums. Whilst they might ne OTT for your initial needs, consider that you can disable the functionality you don't need, leaving you with just FIM - and you (hopefully) know where all your content is, which is teh task most people find so difficult in setting up FIM for security reasons.

We elected to go for a commercial product for our needs, called LogRhythm - our need was security, and LR ticked a lot of the logging and other requirements we had - but for your case I'd say one of these might be a good bet.

Best of luck whichever way you go.
0
 
LVL 2

Expert Comment

by:Hapexamendios
ID: 34981998
Hi rump0054,

I sense Tripwire comes up because whilst what you're essentially looking at is File Integrity Monitoring for a support/service reason, whereas it's more commonly undertaken for security reasons.

Tripwire would do, as would OSSEC (a Host-based Intrusion Detection System), in that they contin the existing logic for performing checks against MD5 or SHA-1 checksums. Whilst they might ne OTT for your initial needs, consider that you can disable the functionality you don't need, leaving you with just FIM - and you (hopefully) know where all your content is, which is teh task most people find so difficult in setting up FIM for security reasons.

We elected to go for a commercial product for our needs, called LogRhythm - our need was security, and LR ticked a lot of the logging and other requirements we had - but for your case I'd say one of these might be a good bet.

Best of luck whichever way you go.
0
 

Author Closing Comment

by:rump0054
ID: 34982125
I actually had stumbled across OSSEC in my research and it sounded like it would work.  Good to hear it from another source.  I'll take a look at it again.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The foremost challenge encountered by an investigator at the very beginning of a forensics investigation is, accessing a file/data to read/view its contents. Owing to the fact, a platform is necessary for both; opening as well as examining any file.…
In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Learn how to create flexible layouts using relative units in CSS.  New relative units added in CSS3 include vw(viewports width), vh(viewports height), vmin(minimum of viewports height and width), and vmax (maximum of viewports height and width).

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now