Analyzing Audit Trails in the Aeolus Security Platform
نویسندگان
چکیده
This thesis presents the design and implementation of an analysis system for audit trails generated by Aeolus, a distributed security platform based on information flow control. Previous work focused on collecting these audit trails in the form of event logs. This thesis presents a model for representing these events and a system for analyzing them. In addition to allowing users to issue SQL queries over the audit log, this analysis system provides mechanisms for active monitoring of events. This thesis introduces a new model for event monitoring called watchers. These watchers receive updates about events from a watcher manager. This manager allows watchers to specify filters and rules for dynamically modifying those filters. My results show that this analysis system can efficiently process large event logs and manage large sets of queries. Thesis Supervisor: Barbara H. Liskov Title: Institute Professor
منابع مشابه
Information Systems Audit Trails; An Australian Government Survey
Journal of Research and Practice in Information Technology, Vol. 34, No. 1, February 2002 47 Information Systems Audit Trails; An Australian Government Survey Caroline Allinson Manager Information Security, Information Management Division, Queensland Police Service, GPO Box 1440, BRISBANE Qld 4001, Australia. and Information Security Research Centre (ISRC), Queensland University of Technology, ...
متن کاملAudit Trail Based on Process Mining and Log
An audit trail is an evidence of all procedures that take place in a system and across a network; it provides an outline of user/system events so that safety measures events can be associated to the actions of a specie individual or system element. Audit trails can be inspected for the existence or nonexistence of confident patterns. Audit trails can be used for measuring security issues, acces...
متن کاملProcess Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance
One approach to secure systems is through the analysis of audit trails. An audit trail is a record of all events that take place in a system and across a network, i.e., it provides a trace of user/system actions so that security events can be related to the actions of a specific individual or system component. Audit trails can be inspected for the presence or absence of certain patterns. This p...
متن کاملContinuous Fraud Detection in Enterprise Systems through Audit Trail Analysis
Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in en...
متن کاملA Network Audit System for Host-based Intrusion Detection (NASHID) CERIAS
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system calls or application sources, operations in the network protocol stack go unaudited. Earlier work has determined the audit data needed to detect low-level network attacks. In this paper we describe an implementation of a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011