Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3427228.3427272acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

On the Forensic Validity of Approximated Audit Logs

Published: 08 December 2020 Publication History

Abstract

Auditing is an increasingly essential tool for the defense of computing systems, but the unwieldy nature of log data imposes significant burdens on administrators and analysts. To address this issue, a variety of techniques have been proposed for approximating the contents of raw audit logs, facilitating efficient storage and analysis. However, the security value of these approximated logs is difficult to measure—relative to the original log, it is unclear if these techniques retain the forensic evidence needed to effectively investigate threats. Unfortunately, prior work has only investigated this issue anecdotally, demonstrating sufficient evidence is retained for specific attack scenarios.
In this work, we address this gap in the literature through formalizing metrics for quantifying the forensic validity of an approximated audit log under differing threat models. In addition to providing quantifiable security arguments for prior work, we also identify a novel point in the approximation design space—that log events describing typical (benign) system activity can be aggressively approximated, while events that encode anomalous behavior should be preserved with lossless fidelity. We instantiate this notion of Attack-Preserving forensic validity in LogApprox, a new approximation technique that eliminates the redundancy of voluminous file I/O associated with benign process activities. We evaluate LogApprox alongside a corpus of exemplar approximation techniques from prior work and demonstrate that LogApprox achieves comparable log reduction rates while retaining 100% of attack-identifying log events. Additionally, we utilize this evaluation to illuminate the inherent trade-off between performance and utility within existing approximation techniques. This work thus establishes trustworthy foundations for the design of the next generation of efficient auditing frameworks.

References

[1]
Raza Ahmad, Melanie Bru, and Ashish Gehani. 2018. Streaming Provenance Compression. In Provenance and Annotation of Data and Processes, Khalid Belhajjame, Ashish Gehani, and Pinar Alper (Eds.). Springer International Publishing, Cham, 236–240.
[2]
AlDanial. 2019. cloc: Count Lines of Code.
[3]
James P. Anderson. 1972. Computer Security Technology Planning Study. Technical Report ESD-TR-73-51. Air Force Electronic Systems Division.
[4]
Adam Bates, Kevin R. B. Butler, and Thomas Moyer. 2015. Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs. In 7th Workshop on the Theory and Practice of Provenance (Edinburgh, Scotland) (TaPP’15).
[5]
Adam Bates, Dave Tian, Kevin R.B. Butler, and Thomas Moyer. 2015. Trustworthy Whole-System Provenance for the Linux Kernel. In Proceedings of 24th USENIX Security Symposium (Washington, D.C.).
[6]
Adam Bates, Dave Tian, Grant Hernandez, Thomas Moyer, Kevin R.B. Butler, and Trent Jaeger. 2017. Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Trans. on Internet Technology 17, 4 (sep 2017), 34:1–34:21.
[7]
Mihir Bellare and Bennet Yee. 1997. Forward integrity for secure audit logs. Technical Report. Computer Science and Engineering Department, University of California at San Diego.
[8]
Y. Ben, Y. Han, N. Cai, W. An, and Z. Xu. 2018. T-Tracker: Compressing System Audit Log by Taint Tracking. In 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). 1–9. https://doi.org/10.1109/PADSW.2018.8645035
[9]
Tara Siegel Bernard, Tiffany Hsu, Nicole Perlroth, and Ron Lieber. 2019. Equifax Says Cyberattack May Have Affected 143 Million in the U.S.https://www.nytimes.com/2017/09/07/business/equifax-cyberattack.html. Last accessed October 16, 2020.
[10]
Carbon Black. 2018. Global Incident Response Threat Report. https://www.carbonblack.com/global-incident-response-threat-report/november-2018/. Last accessed 04-20-2019.
[11]
Microsoft: Windows Dev Center. 2018. About Event Tracing.
[12]
Microsoft: Windows Dev Center. 2018. Event Logging.
[13]
Ang Chen, W. Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, and Wenchao Zhou. 2014. Detecting Covert Timing Channels with Time-Deterministic Replay. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). USENIX Association, Broomfield, CO, 541–554. https://www.usenix.org/conference/osdi14/technical-sessions/presentation/chen_ang
[14]
Chen Chen, Harshal Tushar Lehri, Lay Kuan Loh, Anupam Alur, Limin Jia, Boon Thau Loo, and Wenchao Zhou. 2017. Distributed Provenance Compression. In Proceedings of the 2017 ACM International Conference on Management of Data (Chicago, Illinois, USA) (SIGMOD ’17). ACM, New York, NY, USA, 203–218. https://doi.org/10.1145/3035918.3035926
[15]
DARPA Transparent Computing. 2020. Transparent Computing Engagement 3 Data Release.
[16]
Scott A. Crosby and Dan S. Wallach. 2009. Efficient data structures for tamper-evident logging. In In Proceedings of the 18th USENIX Security Symposium.
[17]
Birhanu Eshete, Rigel Gjomemo, Md Nahid Hossain, Sadegh Momeni, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan, and Junao Wang. 2016. Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program. ArXiv abs/1610.06936(2016).
[18]
Exploit-DB. 2010. UnrealIRCd 3.2.8.1 - Backdoor Command Execution.
[19]
Exploit-DB. 2011. vsftpd 2.3.4 - Backdoor Command Execution.
[20]
Exploit-DB. 2019. Webmin 1.920 - Unauthenticated Remote Code Execution.
[21]
FreeBSD. 2019. DTrace on FreeBSD. https://wiki.freebsd.org/DTrace. Last accessed October 16, 2020.
[22]
Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, and Prateek Mittal. 2018. SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 639–656. https://www.usenix.org/conference/usenixsecurity18/presentation/gao-peng
[23]
Qian Ge, Yuval Yarom, David Cock, and Gernot Heiser. 2018. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. Journal of Cryptographic Engineering 8, 1 (2018), 1–27.
[24]
Ashish Gehani, Minyoung Kim, and Jian Zhang. 2009. Steps Toward Managing Lineage Metadata in Grid Clusters. In 1st Workshop on the Theory and Practice of Provenance (San Francisco, CA) (TaPP’09).
[25]
Ashish Gehani and Dawood Tariq. 2012. SPADE: Support for Provenance Auditing in Distributed Environments. In Proceedings of the 13th International Middleware Conference (ontreal, Quebec, Canada) (Middleware ’12). Springer-Verlag New York, Inc., New York, NY, USA, 101–120. http://dl.acm.org/citation.cfm?id=2442626.2442634
[26]
Xueyan Han, Thomas Pasqueir, Adam Bates, James Mickens, and Margo Seltzer. 2020. Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. In 27th ISOC Network and Distributed System Security Symposium(NDSS’20).
[27]
Ragib Hasan, Radu Sion, and Marianne Winslett. 2009. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance. In Proceedings of the 7th USENIX Conference on File and Storage Technologies(FAST’09). San Francisco, CA, USA.
[28]
Wajih Ul Hassan, Nuraini Aguse, Mark Lemay, Thomas Moyer, and Adam Bates. 2018. Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. In Proceedings of the 25th ISOC Network and Distributed System Security Symposium(NDSS’18). San Diego, CA, USA.
[29]
Wajih Ul Hassan, Adam Bates, and Daniel Marino. 2020. Tactical Provenance Analysis for Endpoint Detection and Response Systems. In 41st IEEE Symposium on Security and Privacy (SP)(Oakland’20).
[30]
Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, and Adam Bates. 2019. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. In 26th ISOC Network and Distributed System Security Symposium(NDSS’19).
[31]
Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, and Thomas Moyer. 2018. Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society. http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_07B-1_Hassan_paper.pdf
[32]
Wajih Ul Hassan, Mohammad Noureddine, Pubali Datta, and Adam Bates. 2020. OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis. In 27th ISOC Network and Distributed System Security Symposium(NDSS’20).
[33]
Jason E. Holt. 2006. Logcrypt: Forward Security and Public Verification for Secure Audit Logs. In Proc. of the Australasian Information Security Workshop (AISW-NetSec).
[34]
Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller, and V.N. Venkatakrishnan. 2017. SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 487–504. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/hossain
[35]
Md Nahid Hossain, Sanaz Sheikhi, and R. Sekar. 2020. Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (S&P).
[36]
Md Nahid Hossain, Junao Wang, R. Sekar, and Scott D. Stoller. 2018. Dependence-preserving Data Compaction for Scalable Forensic Analysis. In Proceedings of the 27th USENIX Conference on Security Symposium (Baltimore, MD, USA) (SEC’18). USENIX Association, Berkeley, CA, USA, 1723–1740. http://dl.acm.org/citation.cfm?id=3277203.3277331
[37]
Vishal Karande, Erick Bauman, Zhiqiang Lin, and Latifur Khan. 2017. SGX-Log: Securing System Logs With SGX. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security(ASIA CCS ’17).
[38]
Samuel T. King and Peter M. Chen. 2003. Backtracking Intrusions. SIGOPS Oper. Syst. Rev. 37, 5 (Oct. 2003), 223–236. https://doi.org/10.1145/1165389.945467
[39]
Brendan I. Koerner. 2019. Inside the Cyberattack That Shocked the US Government. https://www.wired.com/2016/10/inside-cyberattack-shocked-us-government/. Last accessed October 16, 2020.
[40]
Yonghwi Kwon, Dohyeong Kim, William Nick Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu. 2016. LDX: Causality Inference by Lightweight Dual Execution. In Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems (Atlanta, Georgia, USA) (ASPLOS ’16). ACM, New York, NY, USA, 503–515. https://doi.org/10.1145/2872362.2872395
[41]
Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela Ciocarlie, Ashish Gehani, and Vinod Yegneswaran. 2018. MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation. In Proc. of the 25th Network and Distributed System Security Symposium (NDSS’18).
[42]
Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu. 2013. High Accuracy Attack Provenance via Binary-based Execution Partition. In Proceedings of NDSS ’13(San Diego, CA).
[43]
Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu. 2013. LogGC: Garbage Collecting Audit Log. In Proceedings of the 2013 ACM SIGSAC conference on Computer and Communications Security (Berlin, Germany) (CCS ’13). ACM, New York, NY, USA, 1005–1016. https://doi.org/10.1145/2508859.2516731
[44]
Jure Leskovec. 2009. SNAP: Stanford Network Analysis Project.
[45]
Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, and Prateek Mittal. 2018. Towards a Timely Causality Analysis for Enterprise Security. In Proceedings of the 25th ISOC Network and Distributed System Security Symposium(NDSS’18). San Diego, CA, USA.
[46]
Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, and Venkat N. Venkatakrishnan. 2018. ProPatrol: Attack Investigation via Extracted High-Level Tasks. In Information Systems Security, Vinod Ganapathy, Trent Jaeger, and R.K. Shyamasundar(Eds.). Springer International Publishing, Cham, 107–126.
[47]
Di Ma and Gene Tsudik. 2009. A new approach to secure logging. ACM Transactions on Storage (TOS) 5, 1 (2009).
[48]
Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, and Dongyan Xu. 2015. Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. In Proceedings of the 31st Annual Computer Security Applications Conference (Los Angeles, CA, USA) (ACSAC 2015). ACM, New York, NY, USA, 401–410. https://doi.org/10.1145/2818000.2818039
[49]
Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, and Somesh Jha. 2018. Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 241–254. https://www.usenix.org/conference/atc18/presentation/ma-shiqing
[50]
Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu. 2017. MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. In 26th USENIX Security Symposium.
[51]
Shiqing Ma, Xiangyu Zhang, and Dongyan Xu. 2016. ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. In Proceedings of NDSS ’16 (San Diego, CA).
[52]
Emaad Manzoor, Sadegh M. Milajerdi, and Leman Akoglu. 2016. Fast Memory-Efficient Anomaly Detection in Streaming Heterogeneous Graphs. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (San Francisco, California, USA) (KDD ’16). Association for Computing Machinery, New York, NY, USA, 1035–1044. https://doi.org/10.1145/2939672.2939783
[53]
P. McDaniel, K. Butler, S. McLaughlin, R. Sion, E. Zadok, and M. Winslett. 2010. Towards a Secure and Efficient System for End-to-End Provenance. In Proceedings of the 2nd conference on Theory and practice of provenance. USENIX Association, San Jose, CA, USA.
[54]
S. Momeni Milajerdi, R. Gjomemo, B. Eshete, R. Sekar, and V. Venkatakrishnan. 2019. HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows. In 2019 2019 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, Los Alamitos, CA, USA. https://doi.org/10.1109/SP.2019.00026
[55]
MITRE. 2019. MITRE ATT&CK. https://attack.mitre.org. Last accessed October 16, 2020.
[56]
Kiran-Kumar Muniswamy-Reddy, Uri Braun, David A. Holland, Peter Macko, Diana Maclean, Daniel Margo, Margo Seltzer, and Robin Smogor. 2009. Layering in Provenance Systems. In Proceedings of the 2009 Conference on USENIX Annual Technical Conference (San Diego, California) (USENIX’09). USENIX Association, Berkeley, CA, USA, 10–10. http://dl.acm.org/citation.cfm?id=1855807.1855817
[57]
Capital One. 2019. Information on the Capital One Cyber Incident. https://www.capitalone.com/facts2019/. Last accessed October 16, 2020.
[58]
Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, and Dave Tian. 2020. Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. In 27th ISOC Network and Distributed System Security Symposium(NDSS’20).
[59]
Riccardo Paccagnella, Kevin Liao, Dave Tian, and Adam Bates. 2020. Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks. In Proc. of the ACM Conference on Computer and Communications Security (CCS).
[60]
Thomas Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David Eyers, Margo Seltzer, and Jean Bacon. 2017. Practical Whole-system Provenance Capture. In Proceedings of the 2017 Symposium on Cloud Computing (Santa Clara, California) (SoCC ’17). ACM, New York, NY, USA, 405–418. https://doi.org/10.1145/3127479.3129249
[61]
Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, and Dongyan Xu. 2016. HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph. In Proceedings of the 32Nd Annual Conference on Computer Security Applications (Los Angeles, California, USA) (ACSAC ’16). ACM, New York, NY, USA, 583–595. https://doi.org/10.1145/2991079.2991122
[62]
D.J. Pohly, S. McLaughlin, P. McDaniel, and K. Butler. 2012. Hi-Fi: Collecting High-Fidelity Whole-System Provenance. In Proceedings of the 2012 Annual Computer Security Applications Conference(ACSAC ’12). Orlando, FL, USA.
[63]
Rapid7. 2018. WordPress Admin Shell Upload.
[64]
rebootuser. 2019. LinEnum.
[65]
RedHat. 2019. Linux Audit.
[66]
Michael Riley, Ben Elgin, Dune Lawrence, and Carol Matlack. 2019. Target Missed Warnings in Epic Hack of Credit Card Data. https://bloom.bg/2KjElxM. Last accessed October 16, 2020.
[67]
Bruce Schneier and John Kelsey. 1998. Cryptographic Support for Secure Logs on Untrusted Machines. In Proc. of the USENIX Security Symposium (USENIX).
[68]
Bruce Schneier and John Kelsey. 1999. Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC) (1999).
[69]
Gaurav Shah, Andres Molina, and Matt Blaze. 2006. Keyboards and Covert Channels. In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15 (Vancouver, B.C., Canada) (USENIX-SS’06). USENIX Association, USA, Article 5, 17 pages.
[70]
Symantec. 2019. About purging reports. https://help.symantec.com/cs/SYMANTECEDR_4.0/EDR/v118097546_v128933990/About-purging-reports?locale=EN_US.
[71]
Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, and Qun Li. 2018. NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(Toronto, Canada) (CCS ’18). ACM, New York, NY, USA, 1324–1337. https://doi.org/10.1145/3243734.3243763
[72]
Jordan Valinsky. 2020. Clearview AI has billions of our photos. Its entire client list was just stolen. https://www.cnn.com/2020/02/26/tech/clearview-ai-hack/index.html. Last accessed October 16, 2020.
[73]
Fei Wang, Yonghwi Kwon, Shiqing Ma, Xiangyu Zhang, and Dongyan Xu. 2018. Lprov: Practical Library-aware Provenance Tracing. In Proceedings of the 34th Annual Computer Security Applications Conference (San Juan, PR, USA) (ACSAC ’18). ACM, New York, NY, USA, 605–617. https://doi.org/10.1145/3274694.3274751
[74]
Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Jungwhan Rhee, Zhengzhang Zhen, Wei Cheng, Carl A. Gunter, and Haifeng chen. 2020. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. In 27th ISOC Network and Distributed System Security Symposium(NDSS’20).
[75]
Yulai Xie, Dan Feng, Zhipeng Tan, Lei Chen, Kiran-Kumar Muniswamy-Reddy, Yan Li, and Darrell D.E. Long. 2012. A Hybrid Approach for Efficient Provenance Storage. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management (Maui, Hawaii, USA) (CIKM ’12).
[76]
Yulai Xie, Kiran-Kumar Muniswamy-Reddy, Dan Feng, Yan Li, and Darrell D. E. Long. 2013. Evaluation of a Hybrid Approach for Efficient Provenance Storage. Trans. Storage 9, 4, Article 14 (Nov. 2013), 29 pages. https://doi.org/10.1145/2501986
[77]
Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, and Guofei Jiang. 2016. High Fidelity Data Reduction for Big Data Security Dependency Analyses. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Vienna, Austria) (CCS ’16). ACM, New York, NY, USA, 504–516. https://doi.org/10.1145/2976749.2978378
[78]
Attila Altay Yavuz and Peng Ning. 2009. BAF: An efficient publicly verifiable secure audit logging scheme for distributed systems. In Proc. of the Annual Computer Security Applications Conference (ACSAC).
[79]
Attila A Yavuz, Peng Ning, and Michael K Reiter. 2012. Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging. In Proc. of the International Conference on Financial Cryptography and Data Security (FC).

Cited By

View all
  • (2024)AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion DetectionProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3679048(263-277)Online publication date: 30-Sep-2024
  • (2024) eAudit: A Fast, Scalable and Deployable Audit Data Collection System * 2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00087(3571-3589)Online publication date: 19-May-2024
  • (2024)PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description modelJournal of Information Security and Applications10.1016/j.jisa.2023.10368281(103682)Online publication date: Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications Conference
December 2020
962 pages
ISBN:9781450388580
DOI:10.1145/3427228
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 December 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Auditing
  2. Data Provenance
  3. Digital Forensics

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ACSAC '20

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)108
  • Downloads (Last 6 weeks)8
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion DetectionProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3679048(263-277)Online publication date: 30-Sep-2024
  • (2024) eAudit: A Fast, Scalable and Deployable Audit Data Collection System * 2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00087(3571-3589)Online publication date: 19-May-2024
  • (2024)PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description modelJournal of Information Security and Applications10.1016/j.jisa.2023.10368281(103682)Online publication date: Mar-2024
  • (2024)Detecting Lateral Movement: A Systematic SurveyHeliyon10.1016/j.heliyon.2024.e26317(e26317)Online publication date: Feb-2024
  • (2024)Graph-based insider threat detection: A surveyComputer Networks10.1016/j.comnet.2024.110757(110757)Online publication date: Aug-2024
  • (2023)ProvGRP: A Context-Aware Provenance Graph Reduction and Partition Approach for Facilitating Attack InvestigationElectronics10.3390/electronics1301010013:1(100)Online publication date: 25-Dec-2023
  • (2023)EdgeTorrent: Real-time Temporal Graph Representations for Intrusion DetectionProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607201(77-91)Online publication date: 16-Oct-2023
  • (2023)ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph SearchProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623187(2247-2261)Online publication date: 15-Nov-2023
  • (2023)APTHunter: Detecting Advanced Persistent Threats in Early StagesDigital Threats: Research and Practice10.1145/35597684:1(1-31)Online publication date: 31-Mar-2023
  • (2023)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179405(2620-2638)Online publication date: May-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media