Graph clustering and anomaly detection of access control log for forensic purposes

被引:16
|
作者
Studiawan, Hudan [1 ,2 ]
Payne, Christian [1 ]
Sohel, Ferdous [1 ]
机构
[1] Murdoch Univ, Sch Engn & Informat Technol, Yogyakarta, Indonesia
[2] Inst Teknologi Sepuluh Nopember, Dept Informat, Surabaya, Indonesia
关键词
Authentication log; Improved MajorClust; Event log forensics; Anomaly detection;
D O I
10.1016/j.diin.2017.05.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks on operating system access control have become a significant and increasingly common problem. This type of security threat is recorded in a forensic artifact such as an authentication log. Forensic investigators will generally examine the log to analyze such incidents. An anomaly is highly correlated to an attacker's attempts to compromise the system. In this paper, we propose a novel method to automatically detect an anomaly in the access control log of an operating system. The logs will be first preprocessed and then clustered using an improved MajorClust algorithm to get a better cluster. This technique provides parameter-free clustering so that it automatically can produce an analysis report for the forensic investigators. The clustering results will be checked for anomalies based on a score that considers some factors such as the total members in a cluster, the frequency of the events in the log file, and the inter-arrival time of a specific activity. We also provide a graph-based visualization of logs to assist the investigators with easy analysis. Experimental results compiled on an open dataset of a Linux authentication log show that the proposed method achieved the accuracy of 83.14% in the authentication log dataset. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:76 / 87
页数:12
相关论文
共 50 条
  • [1] Access Log Anomaly Detection
    Tharshini, Ma
    Ragavinodini, M.
    Senthilkumar, Radha
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 375 - 381
  • [2] Graph Embedded Pose Clustering for Anomaly Detection
    Markovitz, Amir
    Sharir, Gilad
    Friedman, Itamar
    Zelnik-Manor, Lihi
    Avidan, Shai
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2020), 2020, : 10536 - 10544
  • [3] Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems
    Skopik, Florian
    Wurzenberger, Markus
    Hoeld, Georg
    Landauer, Max
    Kuhn, Walter
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3158 - 3175
  • [4] Log Anomaly Detection by Adversarial Autoencoders With Graph Feature Fusion
    Xie, Yuxia
    Yang, Kai
    IEEE TRANSACTIONS ON RELIABILITY, 2024, 73 (01) : 637 - 649
  • [5] Enhancing Log Anomaly Detection through Knowledge Graph Integration
    Chen, Guan-Fu
    Yang, Tai-Ju
    Chen, Chien Chin
    18TH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING, ICSC 2024, 2024, : 204 - 207
  • [6] LogGC: Novel Approach for Graph-based Log Anomaly Detection
    Andonov, Stefan
    Madjarov, Gjorgji
    2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 1194 - 1202
  • [7] ClusterLog: Clustering Logs for Effective Log-based Anomaly Detection
    Egersdoerfer, Chris
    Zhang, Di
    Dai, Dong
    2022 IEEE/ACM 12TH WORKSHOP ON FAULT TOLERANCE FOR HPC AT EXTREME SCALE (FTXS), 2022, : 1 - 10
  • [8] Anomaly Detection on Interleaved Log Data With Semantic Association Mining on Log-Entity Graph
    Chu, Guojun
    Wang, Jingyu
    Qi, Qi
    Sun, Haifeng
    Zhuang, Zirui
    He, Bo
    Jing, Yuhan
    Zhang, Lei
    Liao, Jianxin
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2025, 51 (02) : 581 - 594
  • [9] A Graph-based Clustering Algorithm for Anomaly Intrusion Detection
    Zhou Mingqiang
    Huang Hui
    Wang Qian
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1311 - 1314
  • [10] Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data
    Wurzenberger, Markus
    Skopik, Florian
    Landauer, Max
    Greitbauer, Philipp
    Fiedler, Roman
    Kastner, Wolfgang
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,