In this paper, we introduce Audlib, an extendable tool for generating security-relevant information on Unix systems. Audlib is a wrapper environment that generates application level audit information from existing executable programs. Audlib is not a detection system, instead it is designed to supplement existing audit systems and work transparently with them. Audlib records information that is not presently available from existing kernel-level audit sources. Here, we describe the design of the Audlib framework and the information it provides. We compare auditing the actions of a web server with Audlib to existing kernel audit sources and show that we have 2-4 times the throughput of Linux auditd and less than half the performance o...
Abstract- Today, the data and assets are critical for all type of organizations and institutions. Co...
Our research described in this paper identifies a three part premise relating to the spyware paradig...
There are numerous ways to handle a company's data. Everything of the company's data, including its ...
In this paper, we introduce Audlib, an extendable tool for generating security-relevant information...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Software users have become more conscious of security. More people have access to Internet and huge ...
Ensuring the security and integrity of computer systems de-ployed on the Internet is growing harder....
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
With cyber-attacks such as credential stuffing and password spraying amongst other attacks that take...
Password auditing can enhance the cyber situational awareness of defenders, e.g. cyber security/IT p...
The contemporary organizations develop business processes in a very complex environment. The IT&...
Most intrusion detection systems available today are usinga single audit source for detecting all at...
In some environments, it is mandatory to keep track of every user activity on a specific system. Sin...
The Log4Audit framework, I developed in my dissertation creates a centralized processing engine that...
Traditionally, computer security monitoring systems are built around the audit systems supplied by o...
Abstract- Today, the data and assets are critical for all type of organizations and institutions. Co...
Our research described in this paper identifies a three part premise relating to the spyware paradig...
There are numerous ways to handle a company's data. Everything of the company's data, including its ...
In this paper, we introduce Audlib, an extendable tool for generating security-relevant information...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Software users have become more conscious of security. More people have access to Internet and huge ...
Ensuring the security and integrity of computer systems de-ployed on the Internet is growing harder....
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
With cyber-attacks such as credential stuffing and password spraying amongst other attacks that take...
Password auditing can enhance the cyber situational awareness of defenders, e.g. cyber security/IT p...
The contemporary organizations develop business processes in a very complex environment. The IT&...
Most intrusion detection systems available today are usinga single audit source for detecting all at...
In some environments, it is mandatory to keep track of every user activity on a specific system. Sin...
The Log4Audit framework, I developed in my dissertation creates a centralized processing engine that...
Traditionally, computer security monitoring systems are built around the audit systems supplied by o...
Abstract- Today, the data and assets are critical for all type of organizations and institutions. Co...
Our research described in this paper identifies a three part premise relating to the spyware paradig...
There are numerous ways to handle a company's data. Everything of the company's data, including its ...