introreductionsoptimizationsevaluationsummary dependency ... · lack of global context makes it...
TRANSCRIPT
![Page 1: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/1.jpg)
Intro Reductions Optimizations Evaluation Summary
Dependency-Preserving Data Compaction for
Scalable Forensic Analysis1
Md Nahid Hossain, Junao Wang, R. Sekar, and Sco� D. Stoller
1This work was supported by DARPA (contract FA8650-15-C-7561) and in part by NSF (grants
CNS-1319137, CNS-1421893 and CCF-1414078) and ONR (grants N00014-15-1-2208, N00014-15-1-2378
and N00014-17-1-2891). 1 / 44
![Page 2: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/2.jpg)
Intro Reductions Optimizations Evaluation Summary Motivation Contribution Background
Long-running A�ack Campaigns on the Increase ...
2 / 44
![Page 3: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/3.jpg)
Intro Reductions Optimizations Evaluation Summary Motivation Contribution Background
Motivation
A�acks may be detected a long time a�er
System logs need to be stored for several months or more
Log data can be GBs per day, per hostEnterprises with 1000s of hosts can produce petabytes of data per year
Not just a storage cost: forensic analysis of large data sets can be
painfully slow
Motivates the need for data compaction techniques.
3 / 44
![Page 4: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/4.jpg)
Intro Reductions Optimizations Evaluation Summary Motivation Contribution Background
Goals
Work with readily available system-call audit data, e.g., Windows
ETW and Linux audit logs
Fine-grained dependency tracking can improve forensic analysis, but such
tracking is not ready for large-scale deployment.
Reduce data volume without degrading forensic analysis.
Events can be dropped if they don’t change (most) forensic analysis results.
4 / 44
![Page 5: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/5.jpg)
Intro Reductions Optimizations Evaluation Summary Motivation Contribution Background
Contributions
Two novel graph-based reduction techniques: Full dependence (FD)
and Source dependence (SD) preservation.
4.6 to 19x reduction on total events.
E�icient algorithms and optimizations for implementing reductions
Can process/analyze about 1M events per second per core
Compact data representation techniques for
o�line storage: 35x smaller on average (before compression)
online analysis: Less than 5 bytes of storage per event in the original data.
5 / 44
![Page 6: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/6.jpg)
Intro Reductions Optimizations Evaluation Summary Motivation Contribution Background
Background: Dependence Graphs
a.com b.com
P Q
C L
E1
2
3
4
5
6
7
8
9
10
11
12
Node: a subject (process) or object (file/network connection).
Edge: timestamped event, oriented in the direction of information flow.
e.g., flow from P to C occurred at t = 3
6 / 44
![Page 7: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/7.jpg)
Intro Reductions Optimizations Evaluation Summary Motivation Contribution Background
Forensic Analysis
Backward analysis: Given a suspect
node (C), trace back to the entry
point of a�ack (a.com)
a.com b.com
P Q
C L
E1
2
3
4
5
6
7
8
9
10
11
12
Forward/Impact analysis: Identify
all nodes potentially compromised
by a suspect node (b.com).
a.com b.com
P Q
C L
E1
2
3
4
5
6
7
8
9
10
11
12
7 / 44
![Page 8: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/8.jpg)
Intro Reductions Optimizations Evaluation Summary Motivation Contribution Background
Forensic Analysis
Backward analysis: Given a suspect
node (C), trace back to the entry
point of a�ack (a.com)
a.com b.com
P Q
C L
E1
2
3
4
5
6
7
8
9
10
11
12
Forward/Impact analysis: Identify
all nodes potentially compromised
by a suspect node (b.com).
a.com b.com
P Q
C L
E1
2
3
4
5
6
7
8
9
10
11
12
8 / 44
![Page 9: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/9.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Reduction Techniques
9 / 44
![Page 10: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/10.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Reduction Techniques
Log-based:
Examine a sequence of events
Determine if some of them can be eliminated without altering
dependencies.
Graph-based:
Construct a dependence graph
Use graph reachability to prune redundant events
Can leverage global context for more powerful reductions
10 / 44
![Page 11: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/11.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Log-based reduction: Run-Merging
Merge successive events if they are identical
(1) A reads F1
(3) A reads F1
(4) B writes F2
(6) B writes F2
11 / 44
![Page 12: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/12.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Log-based reduction: Run-Merging
Merge successive events if they are identical
(1) A reads F1
(4) B writes F2
12 / 44
![Page 13: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/13.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Log-based reduction: Run-Merging
Merge successive events if they are identical
(1) A reads F1
(2) B writes F2
(3) A reads F1
(4) B writes F2
(5) A reads F1
(6) B writes F2
Limitation: thrown o� by intervening events. (No reduction possible.)
13 / 44
![Page 14: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/14.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Log-based reduction: Xu et al [CCS 2016]
Continue merging identical events if intervening events are on di�erent
objects and subjects.
(1) A reads F1
(2) B writes F2
(3) A reads F1
(4) B writes F2
(5) A reads F1
(6) B writes F2
14 / 44
![Page 15: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/15.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Log-based reduction: Xu et al [CCS 2016]
Continue merging identical events if intervening events are on di�erent
objects and subjects.
(1) A reads F1
(2) B writes F2
Reductions are now restored.
15 / 44
![Page 16: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/16.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Log-based reduction: Limitations
Lack of global context makes it di�icult to safely merge events in
several common scenarios, e.g., pipes, log-files, etc.
Communication via pipe
P E Q2
6
4
3
7
5
Xu et al cannot merge (4) with (2) due to outgoing edge from E at (3).
16 / 44
![Page 17: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/17.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Our Approach: Full Dependence (FD) Preservation
Continue to merge identical events if intervening events don’t alter
global dependence of the event’s source, e.g., node P below.
Before reduction
P E Q2
6
4
3
7
5
A�er reduction
P E Q[2, 6] [3, 7]
17 / 44
![Page 18: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/18.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Our Approach: Full Dependence (FD) Preservation
Continue to merge identical events if intervening events don’t alter
global dependence of the event’s source, e.g., node P below.
Before reduction
P E Q2
6
4
3
7
5
A�er reduction
P E Q[2, 6] [3, 7]
18 / 44
![Page 19: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/19.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Source Dependence (SD) Preservation
Takes advantage of how forensic analysis is
typically done.
Backtrack from suspect node to a source node
(“entry point”), then perform forward analysis
Need only preserve dependencies from
source nodes
i.e., nodes with no incoming edges
More powerful than FD: can drop all edges
that don’t introduce new dependencies on
source nodes19 / 44
![Page 20: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/20.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Source Dependence (SD) Preservation
Takes advantage of how forensic analysis is
typically done.
Backtrack from suspect node to a source node
(“entry point”), then perform forward analysis
Need only preserve dependencies from
source nodes
i.e., nodes with no incoming edges
More powerful than FD: can drop all edges
that don’t introduce new dependencies on
source nodes
F
P P ′ P ′′
F ′
1 2 3
4 5 6
20 / 44
![Page 21: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/21.jpg)
Intro Reductions Optimizations Evaluation Summary Log-based reduction Graph-based reduction
Source Dependence (SD) Preservation
Takes advantage of how forensic analysis is
typically done.
Backtrack from suspect node to a source node
(“entry point”), then perform forward analysis
Need only preserve dependencies from
source nodes
i.e., nodes with no incoming edges
More powerful than FD: can drop all edges
that don’t introduce new dependencies on
source nodes
F
P P ′ P ′′
F ′
1 2 3
4
21 / 44
![Page 22: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/22.jpg)
Intro Reductions Optimizations Evaluation Summary Redundant Edge Redundant Node Cycle-collapsing
Optimizations for E�icient Implementation
22 / 44
![Page 23: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/23.jpg)
Intro Reductions Optimizations Evaluation Summary Redundant Edge Redundant Node Cycle-collapsing
E�icient Implementation
Global context is more powerful, but is expensive to compute on
timestamped graphs
Reachability is a function of time, unlike standard graphs
Dependencies cannot be cached and reused
Solution: Convert to a standard graph by versioning all nodes.
Develop optimizations that reduce number of versions by 20x
On average, just 1.26 versions per object or subject
23 / 44
![Page 24: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/24.jpg)
Intro Reductions Optimizations Evaluation Summary Redundant Edge Redundant Node Cycle-collapsing
Versioned Graph
Timestamped Graph
F S G T2
3
5
4
6
5
Naive Versioned Graph
S0F 0
S2
G0
G3
G5
T 0
T 4
T 6
24 / 44
![Page 25: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/25.jpg)
Intro Reductions Optimizations Evaluation Summary Redundant Edge Redundant Node Cycle-collapsing
Redundant Edge Optimization (REO)
Discard edge from uto v if there is
already an edge from
the latest version of uto some version of v .
Naive Versioned Graph
S0F 0
S2
G0
G3
G5
T 0
T 4
T 6
A�er Applying REO Optimization
S0F 0
S2
G0
G3
T 0
T 4
25 / 44
![Page 26: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/26.jpg)
Intro Reductions Optimizations Evaluation Summary Redundant Edge Redundant Node Cycle-collapsing
Redundant node optimization (RNO)
Skip new version
generation for sink
nodes (i.e., nodes
with out-degree zero)
Versioned graph with REO optimization
S0F 0
S2
G0
G3
T 0
T 4
A�er applying RNO optimization
F 0 S0,2 G0,3 T 0,4
26 / 44
![Page 27: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/27.jpg)
Intro Reductions Optimizations Evaluation Summary Redundant Edge Redundant Node Cycle-collapsing
Cycle-Collapsing Optimization (CCO)
Before adding an edge from a version urto vs
, if there is a cycle
involving u and v , then:
Combine the two nodes into a “supernode” representing an
equivalence class
Discard future edges between combined nodes
27 / 44
![Page 28: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/28.jpg)
Intro Reductions Optimizations Evaluation Summary Redundant Edge Redundant Node Cycle-collapsing
Optimized Versioned Graph
Timestamped Graph
a.com b.com
P Q
C L
E1
2
3
4
5
6
78
9
10
11
12
Optimized Versioned Graph
a.com b.com
P1 P4 Q
C L
E
28 / 44
![Page 29: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/29.jpg)
Intro Reductions Optimizations Evaluation Summary Redundant Edge Redundant Node Cycle-collapsing
Optimized Versioned Graph
Timestamped Graph
a.com b.com
P Q
C L
E1
2
3
4
5
6
78
9
10
11
12
Optimized Versioned Graph
a.com b.com
P1 P4 Q
C L
E
29 / 44
![Page 30: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/30.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Experimental Evaluation
30 / 44
![Page 31: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/31.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Evaluation Dataset
Dataset from DARPA Transparent
Computing Program’s 2nd
adversarial engagement
Data from Windows and Linux desktop
systems over 7 days.
Benign background activity, plus a�acks
involving full APT life-cycle.
Data from our lab servers (Linux).
Benign use over 7 days.
Dataset Size
Linux Desktop 12.9 GB
Windows Desktop 2.1 GB
SSH/File Server 6.7 GB
Web server 1.3 GB
Mail server 1.2 GB
31 / 44
![Page 32: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/32.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Data Size (Millions of events)
32 / 44
![Page 33: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/33.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Reduction Factor
Average:
Xu et al: 1.8x
FD: 7.8x
SD: 10.2x
33 / 44
![Page 34: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/34.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Average No. of Versions per node
34 / 44
![Page 35: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/35.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Total Size on Disk (GB)
Factor of
decrease:
FD: 35.3x
SD: 41.4x
35 / 44
![Page 36: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/36.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Dependence Graph Size (MB)
Total memory use across all 5 data sets (about 100M events originally)
36 / 44
![Page 37: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/37.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
(Preliminary) Results on DARPA 3rd
Engagement
Dataset about 10x larger
Linux Desktop: 800M events, reduced by 70x using FD.
Windows Desktop: 70M events, reduced by 10x using FD.
Data size and several other di�erences between the two auditing systems
contributed to the large di�erence in reduction rates.
Summary: Larger data sets o�er more opportunities for reduction
Long running processes experience extended periods without new dependencies.
During these periods, FD eliminates most operations.
37 / 44
![Page 38: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/38.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Impact of Reduction on Forensic Analysis
38 / 44
![Page 39: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/39.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Do reductions interfere with forensic analysis?
In theory: We prove that
FD preserves forward/backward analysis results for all nodes.
SD preserves forward/backward analysis results for source nodes.
In practice: We evaluated during the DARPA adversarial exercise
We had no prior knowledge about a�acks
Performed forensic analysis in real-time on FD-reduced
dependence graph stored in main memory
Analysis triggered when our Sleuth [Sec 2017] system flagged a
suspicious event.
39 / 44
![Page 40: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/40.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Example Graph Constructed a�er Analysis
40 / 44
![Page 41: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/41.jpg)
Intro Reductions Optimizations Evaluation Summary Dataset Reduction Forensic Analysis
Forensic analysis with and without Reductions
Dataset
A�ack
Scenario
Analysis
Type
Number of Entities
Base FD SD
Linux
Desktop
A
Backward 7 7 7
Forward 15 15 15
B
Backward 3 3 3
Forward 10 10 10
Windows
Desktop
A
Backward 4 4 4
Forward 17 17 17
B
Backward 2 2 2
Forward 9 9 9
C
Backward 4 4 4
Forward 7 7 7
41 / 44
![Page 42: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/42.jpg)
Intro Reductions Optimizations Evaluation Summary
Related Work
LogGC [CCS 2013], ProTracer [NDSS 2016], MPI [Sec 2017]:
Specialized for their fine-grained flow tracking system
We target coarse-grained auditing, which can be deployed in large enterprises
Xu et al [CCS 2016]: Log-based reduction uses only local context, is
unable to achieve the kind of reductions we get using global context.
Others
Provenance collection techniques (e.g., PASS [ATC 2006]) incorporate
run-merging, plus cycle detection/avoidance techniques.
ProvWalls [TOIT 2017] describes reductions for MAC systems.
Many other related works discussed in the paper.
42 / 44
![Page 43: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/43.jpg)
Intro Reductions Optimizations Evaluation Summary
Summary
Developed highly e�ective reduction techniques for audit logs.
FD and SD achieve 5x to 19x reduction in the number of events
Developed e�icient algorithms and optimizations for FD and SD
Our techniques can process and analyze about 1M events per second per host.
Presented compact data representation techniques to achieve over
an order of magnitude reduction in storage and main memory sizes.
Thank you! �estions?
43 / 44
![Page 44: IntroReductionsOptimizationsEvaluationSummary Dependency ... · Lack of global context makes it di˙icult to safely merge events in several common scenarios, e.g., pipes, log-files,](https://reader033.vdocument.in/reader033/viewer/2022050521/5fa4db83af06ab4cae672fa9/html5/thumbnails/44.jpg)
Intro Reductions Optimizations Evaluation Summary
Summary
Developed highly e�ective reduction techniques for audit logs.
FD and SD achieve 5x to 19x reduction in the number of events
Developed e�icient algorithms and optimizations for FD and SD
Our techniques can process and analyze about 1M events per second per host.
Presented compact data representation techniques to achieve over
an order of magnitude reduction in storage and main memory sizes.
Thank you! �estions?
44 / 44