TY - GEN
T1 - FAuST
T2 - 38th Annual Computer Security Applications Conference, ACSAC 2022
AU - Inam, Muhammad Adil
AU - Goyal, Akul
AU - Liu, Jason
AU - Mink, Jaron
AU - Michael, Noor
AU - Gaur, Sneha
AU - Bates, Adam
AU - Hassan, Wajih Ul
N1 - Publisher Copyright:
© 2022 ACM.
PY - 2022/12/5
Y1 - 2022/12/5
N2 - System logs are invaluable to forensic audits, but grow so large that in practice fine-grained logs are quickly discarded-if captured at all-preventing the real-world use of the provenance-based investigation techniques that have gained popularity in the literature. Encouragingly, forensically-informed methods for reducing the size of system logs are a subject of frequent study. Unfortunately, many of these techniques are designed for offline reduction in a central server, meaning that the up-front cost of log capture, storage, and transmission must still be paid at the endpoints. Moreover, to date these techniques exist as isolated (and, often, closed-source) implementations; there does not exist a comprehensive framework through which the combined benefits of multiple log reduction techniques can be enjoyed. In this work, we present FAuST, an audit daemon for performing streaming audit log reduction at system endpoints. After registering with a log source (e.g., via Linux Audit's audisp utility), FAuST incrementally builds an in-memory provenance graph of recent system activity. During graph construction, log reduction techniques that can be applied to local subgraphs are invoked immediately using event callback handlers, while techniques meant for application on the global graph are invoked in periodic epochs. We evaluate FAuST, loaded with eight different log reduction modules from the literature, against the DARPA Transparent Computing datasets. Our experiments demonstrate the efficient performance of FAuST and identify certain subsets of reduction techniques that are synergistic with one another. Thus, FAuST dramatically simplifies the evaluation and deployment of log reduction techniques.
AB - System logs are invaluable to forensic audits, but grow so large that in practice fine-grained logs are quickly discarded-if captured at all-preventing the real-world use of the provenance-based investigation techniques that have gained popularity in the literature. Encouragingly, forensically-informed methods for reducing the size of system logs are a subject of frequent study. Unfortunately, many of these techniques are designed for offline reduction in a central server, meaning that the up-front cost of log capture, storage, and transmission must still be paid at the endpoints. Moreover, to date these techniques exist as isolated (and, often, closed-source) implementations; there does not exist a comprehensive framework through which the combined benefits of multiple log reduction techniques can be enjoyed. In this work, we present FAuST, an audit daemon for performing streaming audit log reduction at system endpoints. After registering with a log source (e.g., via Linux Audit's audisp utility), FAuST incrementally builds an in-memory provenance graph of recent system activity. During graph construction, log reduction techniques that can be applied to local subgraphs are invoked immediately using event callback handlers, while techniques meant for application on the global graph are invoked in periodic epochs. We evaluate FAuST, loaded with eight different log reduction modules from the literature, against the DARPA Transparent Computing datasets. Our experiments demonstrate the efficient performance of FAuST and identify certain subsets of reduction techniques that are synergistic with one another. Thus, FAuST dramatically simplifies the evaluation and deployment of log reduction techniques.
KW - Auditing
KW - Log Reduction
UR - http://www.scopus.com/inward/record.url?scp=85144080851&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85144080851&partnerID=8YFLogxK
U2 - 10.1145/3564625.3567990
DO - 10.1145/3564625.3567990
M3 - Conference contribution
AN - SCOPUS:85144080851
T3 - ACM International Conference Proceeding Series
SP - 813
EP - 826
BT - Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022
PB - Association for Computing Machinery
Y2 - 5 December 2022 through 9 December 2022
ER -