Software intrusion is proactively detected using a dynamically evolving
audit log wherein log entries are generated in the audit log and key
values are evolved based upon a one-way function depending on both the
previous log entry and the previous key. The audit log with the generated
log entries and the final key value is transmitted to a clearinghouse
that detects software intrusion by analyzing these values. In an effort
to reduce the size of the log to be transmitted, the log entries are
assigned identical values, thereby only needing to transmit one log entry
and the last key value to the clearinghouse.