Secure and Transparent Audit Logs with BlockAudit

07/21/2019
by   Ashar Ahmad, et al.
0

Audit logs serve as a critical component in enterprise business systems and are used for auditing, storing, and tracking changes made to the data. However, audit logs are vulnerable to a series of attacks enabling adversaries to tamper data and corresponding audit logs without getting detected. Among them, two well-known attacks are "the physical access attack," which exploits root privileges, and "the remote vulnerability attack," which compromises known vulnerabilities in database systems. In this paper, we present BlockAudit: a scalable and tamper-proof system that leverages the design properties of audit logs and security guarantees of blockchain to enable secure and trustworthy audit logs. Towards that, we construct the design schema of BlockAudit and outline its functional and operational procedures. We implement our design on a custom-built Practical Byzantine Fault Tolerance (PBFT) blockchain system and evaluate the performance in terms of latency, network size, payload size, and transaction rate. Our results show that conventional audit logs can seamlessly transition into BlockAudit to achieve higher security and defend against the known attacks on audit logs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/25/2018

Towards Blockchain-Driven, Secure and Transparent Audit Logs

Audit logs serve as a critical component in the enterprise business syst...
research
05/22/2018

Logchain: Blockchain-assisted Log Storage

During the normal operation of a Cloud solution, no one usually pays att...
research
04/20/2021

GDPR-Compliant Use of Blockchain for Secure Usage Logs

The unique properties of blockchain enable central requirements of distr...
research
11/03/2021

Secure Namespaced Kernel Audit for Containers

Despite the wide usage of container-based cloud computing, container aud...
research
09/03/2019

GrAALF:Supporting Graphical Analysis of Audit Logs for Forensics

System-call level audit logs often play a critical role in computer fore...
research
10/12/2018

ProPatrol: Attack Investigation via Extracted High-Level Tasks

Kernel audit logs are an invaluable source of information in the forensi...
research
07/17/2023

LogPrécis: Unleashing Language Models for Automated Shell Log Analysis

The collection of security-related logs holds the key to understanding a...

Please sign up or login with your details

Forgot password? Click here to reset