Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516731
|View full text |Cite
|
Sign up to set email alerts
|

LogGC

Abstract: System-level audit logs capture the interactions between applications and the runtime environment. They are highly valuable for forensic analysis that aims to identify the root cause of an attack, which may occur long ago, or to determine the ramifications of an attack for recovery from it. A key challenge of audit log-based forensics in practice is the sheer size of the log files generated, which could grow at a rate of Gigabytes per day. In this paper, we propose LogGC, an audit logging system with garbage c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 97 publications
(40 citation statements)
references
References 21 publications
0
33
0
Order By: Relevance
“…Our results show that the space consumption of ProTracer is <1.28% of BEEP's on average, and about 7 times smaller than our previous offline log garbage collection technique LogGC [28]. The log generated per day is roughly 13MB without losing precision compared to BEEP.…”
Section: Introductionmentioning
confidence: 78%
See 3 more Smart Citations
“…Our results show that the space consumption of ProTracer is <1.28% of BEEP's on average, and about 7 times smaller than our previous offline log garbage collection technique LogGC [28]. The log generated per day is roughly 13MB without losing precision compared to BEEP.…”
Section: Introductionmentioning
confidence: 78%
“…According to [28], audit logging easily generates gigabytes of log data per host every day. This is particularly problematic for APT defense, as APT malware tends to lurk in the victim host for a long time.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Audit trails analysis is a well-known method used in different realms for identi- cases, audit trails have been used to detect attack incidents [65]. In the context of the current work emphasis is given to contributions dealing with DoS attacks and espe-640 cially those capitalizing on entropy information stemming from network logistic data.…”
Section: Related Workmentioning
confidence: 99%