Skip to main content

Faster Log Analysis and Integration of Security Incidents Using Knuth-Bendix Completion

  • Conference paper
Neural Information Processing (ICONIP 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7063))

Included in the following conference series:

  • 2576 Accesses

Abstract

With the rapid popularization of cloud computing, mobile devices and high speed Internet, recent security incidents have become more complicated which imposes a great burden on network administrators. In this paper we propose an integration and simplification method of log strings obtained by many kinds of computer devices: memory, socket and file. Besides, we apply reasoning strategy for term rewriting called as Knuth-Bendix completion algorithm for ensuring termination and confluent. Knuth Bendix completion includes some inference rules such as lrpo (the lexicographic recursive path ordering) and dynamic demodulation. As a result, we can achieve the reduction of generated clauses which result in faster integration of log strings. In experiment, we present the effectiveness of proposed method by showing the result of exploitation of vulnerability and malware’s behavior log.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wos, L.: The Problem of Self-Analytically Choosing the Weights. J. Autom. Reasoning 4(4), 463–464 (1988)

    Article  Google Scholar 

  2. Wos, L., Robinson, G.A., Carson, D.F., Shalla, L.: The Concept of Demodulation in Theorem Proving. Journal of Automated Reasoning (1967)

    Google Scholar 

  3. Wos, L., Robinson, G.A., Carsonmh, D.F.: Efficiency Completeness of the Set of Support Strategy in Theorem Provingh. Journal of Automated Reasoning (1965)

    Google Scholar 

  4. Wos, L.: The Problem of Explaining the Disparate Performance of Hyperresolution and Paramodulation. J. Autom. Reasoning 4(2), 215–217 (1988)

    Article  MathSciNet  Google Scholar 

  5. Wos, L.: The Problem of Choosing the Type of Subsumption to Use. J. Autom. Reasoning 7(3), 435–438 (1991)

    Article  MATH  Google Scholar 

  6. Knuth, D., Bendix, P.: Simple word problems in universal algebras. In: Leech, J. (ed.) Computational Problems in Abstract Algebra, pp. 263–297 (1970)

    Google Scholar 

  7. Microsoft Security Advisory, http://www.microsoft.com/technet/security/advisory/979352.mspx

  8. Operation Aurora Hit Google, Others. McAfee, Inc. (January 14, 2010)

    Google Scholar 

  9. CVE-1999-0256, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0256

  10. Miyachi, T., Basuki, A., Mikawa, S., Miwa, S., Chinen, K.-i., Shinoda, Y.: Educational Environment on StarBED —Case Study of SOI. In: Asia 2008 Spring Global E-Workshop–, Asian Internet Engineering Conference (AINTEC) 2008, Bangkok, Thailand, pp. 27–36. ACM (November 2008) ISBN: 978-1-60558-127-9

    Google Scholar 

  11. Ando, R.: Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning. In: 16th International Conference on Neural Information Processing ICONIP 2009, Bangkok, Thailand, December 1-5 (2009)

    Google Scholar 

  12. Schneider, S., Beschastnikh, I., Chernyak, S., Ernst, M.D., Brun, Y.: Synoptic: Summarizing system logs with refinement. Appeared at the Workshop on Managing Systems via Log Analysis and Machine Learning Techniques, SLAML (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ando, R., Miwa, S. (2011). Faster Log Analysis and Integration of Security Incidents Using Knuth-Bendix Completion. In: Lu, BL., Zhang, L., Kwok, J. (eds) Neural Information Processing. ICONIP 2011. Lecture Notes in Computer Science, vol 7063. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24958-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24958-7_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24957-0

  • Online ISBN: 978-3-642-24958-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics