Auditing overhead, auditing adaptation, and benchmark evaluation in Linux
نویسندگان
چکیده
Logging is a critical component of Linux auditing. However, our experiments indicate that the logging overhead can be significant. The paper aims to leverage the performance overhead introduced by Linux audit framework under various usage patterns. The study on the problem leads to an adaptive audit-logging mechanism. Many security incidents or other important events are often accompanied with precursory events. We identify important precursory events – the vital signs of system activity and the audit events that must be recorded. We then design an adaptive auditing mechanism that increases or reduces the type of events collected and the frequency of events collected based upon the online analysis of the vital-sign events. The adaptive auditing mechanism reduces the overall system overhead and achieves a similar level of protection on the system and network security. We further adopt LMbench to evaluate the performance of key operations in Linux with compliance to four security standards. Copyright © 2015 John Wiley & Sons, Ltd.
منابع مشابه
Privacy Analysis & Enhancements for Data Sharing in *nix Systems
Linux and its various flavors (together called *nix) are growing in mainstream popularity and many enterprise infrastructures now are based on *nix platforms. An important component of these systems is the ingrained multi-user support that lets users share data with each other. In this paper, we first analyze *nix systems and identify an urgent need for better privacy support in their data shar...
متن کاملCarbon: trusted auditing for P2P distributed virtual environments
Many Peer-to-Peer Distributed Virtual Environments (P2P DVE’s) have been proposed, but none are widely deployed. One significant barrier to deployment is lack of security. This paper presents Carbon, a trusted auditing system for P2P DVE’s which provides reasonable security with low per-client overhead. DVE’s using Carbon perform offline auditing to evaluate DVE client correctness. Carbon audit...
متن کاملUnderstanding One’s Systems: A New Role for Auditing
Auditing at the kernel level has frequently been used to debug the performance of operating systems and applications [27, 8] or to detect intrusions by finding anomalies in program behavior [20, 16]. This paper explores an alternative use of auditing to enhance understanding of system behavior and improve the processes of diagnosing and responding to failures. We describe our experiences with t...
متن کاملThe Adaptation and Routinization Processes of A Continuous Auditing System Implementation
How to adopt computer-assisted auditing techniques (CAATTs) quickly and develop a continuous auditing system are the critical issues for the implementation of automated auditing techniques. In this research, we study the technological adaptation process of a case company, which continuously implemented four CAATTs projects in three years. We summarized and analyzed the routinization process of ...
متن کاملInfluence factors analysis of online auditing performance Using Gray Analysis (GIA)
Many researches on online technology and online auditing applications have been conducted, but researches on online auditing performance are very limited. The purpose of this study is to analyze the factors affecting performance and to assess the performance of online auditing using Gray Analysis (GIA). The statistical society of this study is 10 top stock companies who want to use online audit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Security and Communication Networks
دوره 8 شماره
صفحات -
تاریخ انتشار 2015