Skip to main content

Better Logging through Formality

Applying Formal Specification Techniques to Improve Audit Logs and Log Consumers

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1907))

Abstract

We rely on programs that consume audit logs to do so successfully (a robustness issue) and form the correct interpretations of the input (a semantic issue). The vendor’s documentation of the log format is an important part of the specification for any log consumer. As a specification, it is subject to improvement using formal specification techniques. This work presents a methodology for formalizing and refining the description of an audit log to improve robustness and semantic accuracy of programs that use the log. Ideally applied during design of a new format, the methodology is also profitably applied to existing log formats. Its application to Solaris BSM (an existing, commercial format) demonstrated utility by detecting ambiguities or errors of several types in the documentation or implementation of BSM logging, and identifying opportunities to improve the content of the logs. The products of this work are the methodology itself for use in refining other log formats and their consumers, and an annotated, machine-readable grammar for Solaris BSM that can be used by the community to quickly construct applications that consume BSM logs.

Supported in part by an Intel Foundation Graduate Fellowship, by contracts MDA904-96-1-0116 and MDA904-97-6-0176 from Maryland Procurement Office, and by sponsors of the Center for Education and Research in Information Assurance and Security.

Supported in part by Grant EIA-9903545 from the National Science Foundation, and by sponsors of the Center for Education and Research in Information Assurance and Security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Matt Bishop. A standard audit trail format. In Proceedings of the 1995 National Information Systems Security Conference, pages 136–145, Baltimore, Maryland, October 1995.

    Google Scholar 

  2. Mark Crosbie, Bryn Dole, Todd Ellis, Ivan Krsul, and Eugene Spafford. IDIOT users guide. Technical Report TR-96-050, Purdue University, September 1996.

    Google Scholar 

  3. J. Gosling, B. Joy, and G. Steele. The Java Language Specification. Addison-Wesley, 1996.

    Google Scholar 

  4. John E. Hopcroft and Jeffrey D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 1979.

    Google Scholar 

  5. Koral Ilgun. USTAT: A Real-Time Intrusion Detection System for UNIX. MS thesis, University of California, Santa Barbara, November 1992.

    Google Scholar 

  6. SRI International. EMERALD website. http://www.sdl.sri.com/emerald/, April 2000.

  7. Ulf Lindqvist and Phillip A. Porras. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, California, October 1999.

    Google Scholar 

  8. Sun Microsystems. SunSHIELD Basic Security Module Guide. Sun Microsystems, 901 San Antonio Road, Palo Alto, California, Solaris 2.6 edition, 1997. Part Number 802-5757-10.

    Google Scholar 

  9. P. Mockapetris. Domain names-concepts and facilities. STD 13, ISI, November 1987.

    Google Scholar 

  10. Abdelaziz Mounji. Languages and Tools for Rule-Based Distributed Intrusion Detection. D.Sc. thesis, Universitaires Notre-Dame de la Paix Namur (Belgium), September 1997.

    Google Scholar 

  11. Terence Parr. ANTLR website. http://www.antlr.org/, February 2000.

  12. Terence John Parr. Obtaining Practical Variants of LL(k) and LR(k) for k > 1 by Splitting the Atomic k-tuple. PhD thesis, Purdue University, August 1993.

    Google Scholar 

  13. Manfred Ruschitzka. Two-level grammars for data conversions. Future Generation Computer Systems, pages 373–380, 1990.

    Google Scholar 

  14. Brian Tung. Common intrusion detection framework. http://www.gidos.org/, November 1999.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Flack, C., Atallah, M.J. (2000). Better Logging through Formality. In: Debar, H., Mé, L., Wu, S.F. (eds) Recent Advances in Intrusion Detection. RAID 2000. Lecture Notes in Computer Science, vol 1907. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39945-3_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-39945-3_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41085-0

  • Online ISBN: 978-3-540-39945-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics