Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427272
|View full text |Cite
|
Sign up to set email alerts
|

On the Forensic Validity of Approximated Audit Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 38 publications
0
7
0
Order By: Relevance
“…However, Fig 6b clearly shows that the model categories are not entirely delimited by their triangle configuration: for example, models in Kaczmarczyck et al [27], Noor et al [34] and Xiao et al [48] have similar, central triangle placements even though they are members of the deep learning, statistical and respectively simulation categories. Furthermore, even though their topics are also different, namely automated malware family identification, illustrating a mechanism for key distribution on automotive networks and analysing the forensic validity of approximated audit logs, they all obtain a more balanced configuration by introducing qualitative reasoning about their inner workings.…”
Section: Simulation Modelsmentioning
confidence: 99%
“…However, Fig 6b clearly shows that the model categories are not entirely delimited by their triangle configuration: for example, models in Kaczmarczyck et al [27], Noor et al [34] and Xiao et al [48] have similar, central triangle placements even though they are members of the deep learning, statistical and respectively simulation categories. Furthermore, even though their topics are also different, namely automated malware family identification, illustrating a mechanism for key distribution on automotive networks and analysing the forensic validity of approximated audit logs, they all obtain a more balanced configuration by introducing qualitative reasoning about their inner workings.…”
Section: Simulation Modelsmentioning
confidence: 99%
“…Audit logs are themselves a key target for an attacker who needs to erase any trace of their malicious activities; otherwise, they may get caught and then possibly prosecuted. The need for securing audit logging was raised already in different contexts, including hardware [3]; systems [4,5]; file systems [6]; databases [7]; secure logging protocols [8]; distributed systems [2,[10][11][12][13][14]; blockchain [1,[16][17][18][19][20]; and blockchain hardware [28], as well as many others. In this section, we describe some pieces of research in securing audit logging, with particular attention on distributed systems and cloud computing; we describe blockchain-based mechanisms later in the following subsection.…”
Section: Audit Based Systemsmentioning
confidence: 99%
“…Audit logs are used to keep track of important events about system activities and are a fundamental mechanism for digital forensics because they provide information about past and current events and hence, the path of states of a system [2]. The need for protecting logs from attackers was already stated by various researchers in different contexts, in the context of hardware [3]; systems [4,5]; file systems [6]; databases [7]; and secure logging protocols [8]. Companies are currently attracted to migrate to cloud computing services [9].…”
Section: Introductionmentioning
confidence: 99%
“…In most cases, analysts act as the backbone in SOCs (security operations center) to correlate various attack stages through reviewing numerous system logs [45]. Unfortunately, as the volume of audit data is typically overwhelming even after reducing noisy logs irrelevant to attacks [27,33,37,38,44,47], it is infeasible to manually analyze cyber threats directly based on audit logs [22,23].…”
Section: Related Workmentioning
confidence: 99%