GrAALF:Supporting Graphical Analysis of Audit Logs for Forensics

09/03/2019
by   Omid Setayeshfar, et al.
0

System-call level audit logs often play a critical role in computer forensics. They capture low-level interactions between programs and users in much detail, making them a rich source of insight on malicious user activity. However, using these logs to discover and understand malicious activities from a typical computer that produces more than 3GB of logs daily is both compute and time intensive. We introduce a graphical system for efficient loading, storing, processing, querying, and displaying system events to support computer forensics called GrAALF. In comparison to other related systems such as AIQL [13] and SAQL [12], GrAALF offers the flexibility of multiple backend storage solutions, easy-to-use and intuitive querying of logs, and the ability to trace back longer sequences of system events in (near) real-time to help identify and isolate attacks. Equally important, both AIQL and SAQL are not available for public use, whereas GrAALF is open-source. GrAALF offers the choice of compactly storing the logs in main memory, in a relational database system, in a hybrid main memory database system, and a graph-based database. We compare the responsiveness of each of these options, using multiple very large system-call log files. Next, in multiple real-world attack scenarios, we demonstrate the efficacy and usefulness of GrAALF in identifying the attack and discovering its provenance. Consequently, GrAALF offers a robust solution for analysis of audit logs to support computer forensics

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/16/2023

Mining Reviews in Open Source Code for Developers Trail: A Process Mining Approach

Audit trails are evidential indications of activities performers in any ...
research
01/24/2020

Software Logging for Machine Learning

System logs perform a critical function in software-intensive systems as...
research
08/13/2020

Identifying candidate routines for Robotic Process Automation from unsegmented UI logs

Robotic Process Automation (RPA) is a technology to develop software bot...
research
07/21/2019

Secure and Transparent Audit Logs with BlockAudit

Audit logs serve as a critical component in enterprise business systems ...
research
01/24/2019

Mokka: RSM for open networks

Mokka is a PC (CAP theorem) consensus algorithm for handling replicated ...
research
06/21/2022

Multilayer Block Models for Exploratory Analysis of Computer Event Logs

We investigate a graph-based approach to exploratory data analysis in th...
research
10/12/2018

ProPatrol: Attack Investigation via Extracted High-Level Tasks

Kernel audit logs are an invaluable source of information in the forensi...

Please sign up or login with your details

Forgot password? Click here to reset