Analyzing Audit Trails in the Aeolus Security Platform

نویسندگان

  • Aaron Blankstein
  • Barbara H. Liskov
  • Christopher J. Terman
چکیده

This thesis presents the design and implementation of an analysis system for audit trails generated by Aeolus, a distributed security platform based on information flow control. Previous work focused on collecting these audit trails in the form of event logs. This thesis presents a model for representing these events and a system for analyzing them. In addition to allowing users to issue SQL queries over the audit log, this analysis system provides mechanisms for active monitoring of events. This thesis introduces a new model for event monitoring called watchers. These watchers receive updates about events from a watcher manager. This manager allows watchers to specify filters and rules for dynamically modifying those filters. My results show that this analysis system can efficiently process large event logs and manage large sets of queries. Thesis Supervisor: Barbara H. Liskov Title: Institute Professor

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Systems Audit Trails; An Australian Government Survey

Journal of Research and Practice in Information Technology, Vol. 34, No. 1, February 2002 47 Information Systems Audit Trails; An Australian Government Survey Caroline Allinson Manager Information Security, Information Management Division, Queensland Police Service, GPO Box 1440, BRISBANE Qld 4001, Australia. and Information Security Research Centre (ISRC), Queensland University of Technology, ...

متن کامل

Audit Trail Based on Process Mining and Log

An audit trail is an evidence of all procedures that take place in a system and across a network; it provides an outline of user/system events so that safety measures events can be associated to the actions of a specie individual or system element. Audit trails can be inspected for the existence or nonexistence of confident patterns. Audit trails can be used for measuring security issues, acces...

متن کامل

Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance

One approach to secure systems is through the analysis of audit trails. An audit trail is a record of all events that take place in a system and across a network, i.e., it provides a trace of user/system actions so that security events can be related to the actions of a specific individual or system component. Audit trails can be inspected for the presence or absence of certain patterns. This p...

متن کامل

Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis

Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in en...

متن کامل

A Network Audit System for Host-based Intrusion Detection (NASHID) CERIAS

Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system calls or application sources, operations in the network protocol stack go unaudited. Earlier work has determined the audit data needed to detect low-level network attacks. In this paper we describe an implementation of a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011