Auditing with Incomplete Logs
نویسندگان
چکیده
The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy enforcement mechanisms are often complemented with auditing mechanisms that rely on an a posteriori analysis of logs recording users’ activities to prove conformity to policies and detect policy violations when a valid explanation of conformity does not exist. However, existing auditing solutions require that the information necessary to assess policy compliance is available for the analysis. This assumption is not realistic. Indeed, a good deal of users’ activities may not be under the control of the IT system and thus they cannot be logged. In this paper we tackle the problem of accessing policy compliance in presence of incomplete logs. In particular, we present an auditing framework to assist analysts in finding a valid explanation for the events recorded in the logs and to pinpoint policy violations if such an explanation does not exist, when logs are incomplete. We also introduce two strategies for the refinement of plausible explanations of conformity to drive analysts along the auditing process. Our framework has been implemented on top of CIFF, an abductive proof procedure, and the efficiency and effectiveness of the refinement strategies evaluated.
منابع مشابه
Foundations for Auditing Assurance
Retrospective security is an important element of layered security systems. Auditing is central to the theory and practice of retrospective security, however, in systems where auditing is used, programs are typically instrumented to generate audit logs using manual, adhoc strategies. This is a potential source of error even if log auditing techniques are formal, since the relation of the log it...
متن کاملForensic discovery auditing of digital evidence containers
Current digital forensics methods capture, preserve, and analyze digital evidence in generalpurpose electroniccontainers (typically, plainfiles) with no dedicated support tohelp establish that the evidence has been properly handled. Auditing of a digital investigation, from identification and seizure of evidence through duplication and investigation is, essentially, ad hoc, recorded in separate...
متن کاملDevelopment of an Intelligent System to Synthesize Petrophysical Well Logs
Porosity is one of the fundamental petrophysical properties that should be evaluated for hydrocarbon bearing reservoirs. It is a vital factor in precise understanding of reservoir quality in a hydrocarbon field. Log data are exceedingly crucial information in petroleum industries, for many of hydrocarbon parameters are obtained by virtue of petrophysical data. There are three main petrophysical...
متن کاملA Framework for Centralized Access Monitoring over Cloud Architectures
While we talk about monitoring, the performance and compliance aspects are only on focus, however, the fine grained access logs also needs to be maintained if a proper internal audit is to be realized at organization level. Also, we do need to maintain long term logs for auditing purposes at internal auditing. In generic monitoring services provided by most of the cloud vendors, the case of mon...
متن کاملExtending Access Management to maintain audit logs in cloud computing
considering the most often talked about security risks in cloud computing, like, security and compliance, viability, lack of transparency, reliability and performance issues. Bringing strong auditability in cloud services can reduce these risks to a great extent. Also, auditing, both internally and externally is generally required and sometimes unavoidable looking into the present day competiti...
متن کامل