Solved

How can I monitor file integrity of thousands of digital library resources?

Posted on 2011-02-24
5
345 Views
Last Modified: 2012-05-11
I work the UC Berkeley in the Library Systems Office.  Our main purpose is to host digital collections and provide end users with the tools to create them and the storage to place the files.  After 20 years of host these types of projects and several server changes and file moves we have come to the realization that we need to be able to monitor all of these files to make sure that they don't become corrupt and if they do we need to know so we can replace the corrupted file with a previous version.

Does anyone know of an open-source solution to this problem?  Any and all help is appreciated!
0
Comment
Question by:rump0054
  • 2
  • 2
5 Comments
 
LVL 82

Expert Comment

by:Dave Baldwin
ID: 34974606
'md5sum' http://en.wikipedia.org/wiki/Md5sum is frequently used and as the article notes, it is part of many operating systems.  The MD5 sum is often found on web sites for files to be downloladed so you can verify your downloads.  There is also sha1sum http://en.wikipedia.org/wiki/Sha1sum .
0
 

Author Comment

by:rump0054
ID: 34974699
I did do a application planning phase for this project and I was planning on using MD5 so it's good to hear that others agree that MD5 is appropriate for this purpose.

My main request is if anyone knows of any open source solution, something like Tripwire for example, so I wouldn't have to actually create the application myself.

BTW: The reason I list Tripwire but planning on using it is that it seems to be overkill for what my simple needs are but if someone has experience with it that shows otherwise I could just give that another try as well...
0
 
LVL 2

Accepted Solution

by:
Hapexamendios earned 50 total points
ID: 34981997
Hi rump0054,

I sense Tripwire comes up because whilst what you're essentially looking at is File Integrity Monitoring for a support/service reason, whereas it's more commonly undertaken for security reasons.

Tripwire would do, as would OSSEC (a Host-based Intrusion Detection System), in that they contin the existing logic for performing checks against MD5 or SHA-1 checksums. Whilst they might ne OTT for your initial needs, consider that you can disable the functionality you don't need, leaving you with just FIM - and you (hopefully) know where all your content is, which is teh task most people find so difficult in setting up FIM for security reasons.

We elected to go for a commercial product for our needs, called LogRhythm - our need was security, and LR ticked a lot of the logging and other requirements we had - but for your case I'd say one of these might be a good bet.

Best of luck whichever way you go.
0
 
LVL 2

Expert Comment

by:Hapexamendios
ID: 34981998
Hi rump0054,

I sense Tripwire comes up because whilst what you're essentially looking at is File Integrity Monitoring for a support/service reason, whereas it's more commonly undertaken for security reasons.

Tripwire would do, as would OSSEC (a Host-based Intrusion Detection System), in that they contin the existing logic for performing checks against MD5 or SHA-1 checksums. Whilst they might ne OTT for your initial needs, consider that you can disable the functionality you don't need, leaving you with just FIM - and you (hopefully) know where all your content is, which is teh task most people find so difficult in setting up FIM for security reasons.

We elected to go for a commercial product for our needs, called LogRhythm - our need was security, and LR ticked a lot of the logging and other requirements we had - but for your case I'd say one of these might be a good bet.

Best of luck whichever way you go.
0
 

Author Closing Comment

by:rump0054
ID: 34982125
I actually had stumbled across OSSEC in my research and it sounded like it would work.  Good to hear it from another source.  I'll take a look at it again.
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
check modified time 4 423
digital forensics 9 355
How to determine if a screenshot was manipulated. 11 1,128
IE/Chrome Logs on windows 7 laptop 3 150
The foremost challenge encountered by an investigator at the very beginning of a forensics investigation is, accessing a file/data to read/view its contents. Owing to the fact, a platform is necessary for both; opening as well as examining any file.…
In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now