Reconstructing system state for intrusion analysis

  • Authors:
  • Ashvin Goel;Kamran Farhadi;Kenneth Po;Wu-chang Feng

  • Affiliations:
  • University of Toronto;University of Toronto;University of Toronto;Portland State University

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The analysis of a compromised system is a time-consuming and error-prone task today because commodity operating systems provide limited auditing facilities. We have been developing an operating-system level auditing system called Forensix that captures a high-resolution image of all system activities so that detailed analysis can be performed after an attack is detected. The challenge with this approach is that the large amount of audit data generated can overwhelm analysis tools. In this paper, we describe a technique that helps generate a time-line of the state of the system. This technique, based on preprocessing the audit log, simplifies the implementation of the analysis queries and enables running the analysis tools interactively on large data sets.