Identifying the provenance of correlated anomalies

  • Authors:
  • Dawood Tariq;Basim Baig;Ashish Gehani;Salman Mahmood;Rashid Tahir;Azeem Aqil;Fareed Zaffar

  • Affiliations:
  • SRI International, Menlo Park, CA;SRI International, Menlo Park, CA;SRI International, Menlo Park, CA;Lahore University of Management Sciences, Lahore, Punjab, Pakistan;Lahore University of Management Sciences, Lahore, Punjab, Pakistan;Lahore University of Management Sciences, Lahore, Punjab, Pakistan;Lahore University of Management Sciences, Lahore, Punjab, Pakistan

  • Venue:
  • Proceedings of the 2011 ACM Symposium on Applied Computing
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Identifying when anomalous activity is correlated in a distributed system is useful for a range of applications from intrusion detection to tracking quality of service. The more specific the logs, the more precise the analysis they allow. However, collecting detailed logs from across a distributed system can deluge the network fabric. We present an architecture that allows fine-grained auditing on individual hosts, space-efficient representation of anomalous activity that can be centrally correlated, and tracing anomalies back to individual files and processes in the system. A key contribution is the design of an anomaly-provenance bridge that allows opaque digests of anomalies to be mapped back to their associated provenance.