Xanthus: Push-button Orchestration of Host Provenance Data Collection

05/10/2020
by   Xueyuan Han, et al.
0

Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious behavior. Unfortunately, evaluating these anomaly detectors is hard. There are few high-quality, publicly-available audit logs, and there are no pre-existing frameworks that enable push-button creation of realistic system traces. To make trace generation easier, we created Xanthus, an automated tool that orchestrates virtual machines to generate realistic audit logs. Using Xanthus' simple management interface, administrators select a base VM image, configure a particular tracing framework to use within that VM, and define post-launch scripts that collect and save trace data. Once data collection is finished, Xanthus creates a self-describing archive, which contains the VM, its configuration parameters, and the collected trace data. We demonstrate that Xanthus hides many of the tedious (yet subtle) orchestration tasks that humans often get wrong; Xanthus avoids mistakes that lead to non-replicable experiments.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/25/2022

Trace Recovery from Stochastically Known Logs

In this work we propose an algorithm for trace recovery from stochastica...
research
04/25/2022

Topological Data Analysis for Anomaly Detection in Host-Based Logs

Topological Data Analysis (TDA) gives practioners the ability to analyse...
research
01/13/2021

Multi-Source Anomaly Detection in Distributed IT Systems

The multi-source data generated by distributed systems, provide a holist...
research
11/13/2020

Digital trace data collection through data donation

A potentially powerful method of social-scientific data collection and i...
research
09/01/2021

Selecting Optimal Trace Clustering Pipelines with AutoML

Trace clustering has been extensively used to preprocess event logs. By ...
research
11/25/2019

Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data

This paper proposes a methodology for host-based anomaly detection using...
research
04/11/2019

Combining Conformance Checking and Classification of XES Log Data for the Manufacturing Domain

Currently, data collection on the shop floor is based on individual reso...

Please sign up or login with your details

Forgot password? Click here to reset