EagleEye: A logging framework for accountable distributed and networked systems

We propose EagleEye, an accountable logging framework as a middleware for distributed and networked systems. EagleEye offloads the logging function from the distributed application program so that applications can focus on the logic handling without worrying about when and how to do logging. By capturing and analyzing network packets, EagleEye is able to reproduce the entire networking event history in the application layer, which is the basis of implementing an accountable system. We provide a case study by replacing the logging component of PeerReview [1] with EagleEye. The evaluation result shows that EagleEye can achieve equivalent accountability without modifying the host application program, which can save numerous workloads of modifying, republishing, and redeploying the host software.

[1]  Jie Wu,et al.  A Quantitative Study of Accountability in Wireless Multi-hop Networks , 2010, 2010 39th International Conference on Parallel Processing.

[2]  Yang Xiao,et al.  Building a wireless capturing tool for WiFi , 2009, Secur. Commun. Networks.

[3]  Glenn A. Fink,et al.  Predicting Computer System Failures Using Support Vector Machines , 2008, WASL.

[4]  Rajeev Gandhi,et al.  SALSA: Analyzing Logs as StAte Machines (CMU-PDL-08-111) , 2008 .

[5]  G. Towl Editorial , 2012, Evidence Based Mental Health.

[6]  Simson L. Garfinkel,et al.  Practical UNIX and Internet Security , 1996 .

[7]  H. Niedermayer,et al.  Accountable Internet Protocol , 2009 .

[8]  M. W. Raad A ubiquitous mobile telemedicine system for the elderly using RFID , 2010, Int. J. Secur. Networks.

[9]  Daisuke Takahashi,et al.  Retrieving knowledge from auditing log-files for computer and network forensics and accountability , 2008, Secur. Commun. Networks.

[10]  Andreas Haeberlen,et al.  PeerReview: practical accountability for distributed systems , 2007, SOSP.

[11]  P. Reiher,et al.  Building accountability into the future Internet , 2008, 2008 4th Workshop on Secure Network Protocols.

[12]  John M. Boone,et al.  INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .

[13]  Susana Garrido Azevedo,et al.  Radio frequency identification: a case study of healthcare organisations , 2010, Int. J. Secur. Networks.

[14]  Nick Feamster,et al.  Holding the Internet Accountable , 2007, HotNets.

[15]  Nick Feamster,et al.  Accountable internet protocol (aip) , 2008, SIGCOMM '08.

[16]  Toby Moncaster,et al.  Re-ECN: Adding Accountability for Causing Congestion to TCP/IP , 2010 .

[17]  Robert F. Mills,et al.  Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees , 2010, Int. J. Secur. Networks.

[18]  Keith Mayes,et al.  An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing , 2010, Int. J. Secur. Networks.

[19]  Mark J. Rodrigues,et al.  Perceived barriers to the widespread commercial use of Radio Frequency Identification technology , 2010, Int. J. Secur. Networks.

[20]  Jeffrey S. Chase,et al.  Trust but verify: accountability for network services , 2004, EW 11.

[21]  Xiaowen Zhang,et al.  Looking at a class of RFID APs through GNY logic , 2010, Int. J. Secur. Networks.

[22]  Yang Xiao Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.

[23]  Andreas Haeberlen,et al.  The Case for Byzantine Fault Detection , 2006, HotDep.

[24]  Sébastien Tricaud,et al.  Picviz: Finding a Needle in a Haystack , 2008, WASL.

[25]  Manmeet Mahinderjit Singh,et al.  Trust in RFID-enabled Supply-Chain Management , 2010, Int. J. Secur. Networks.

[26]  Yusheng Ji,et al.  Secure and efficient data transmission in RFID sensor networks , 2010, Int. J. Secur. Networks.

[27]  Rajeev Gandhi,et al.  SALSA: Analyzing Logs as StAte Machines , 2008, WASL.

[28]  L. Sun,et al.  Security and privacy on low-cost Radio Frequency Identification systems , 2010, Int. J. Secur. Networks.

[29]  Brian Tierney,et al.  NetLogger: A Toolkit for Distributed System Performance Tuning and Debugging , 2003, Integrated Network Management.

[30]  Jeffrey S. Chase,et al.  Strong accountability for network storage , 2007, TOS.

[31]  Yang Xiao,et al.  P-Accountable Networked Systems , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[32]  Katerina J. Argyraki,et al.  Loss and Delay Accountability for the Internet , 2007, 2007 IEEE International Conference on Network Protocols.

[33]  Martin Feldhofer,et al.  On the security of RFID devices against implementation attacks , 2010, Int. J. Secur. Networks.

[34]  Stefan Savage,et al.  Proceedings of the ACM SIGCOMM 2008 conference on Data communication , 2008, SIGCOMM 2008.

[35]  Jeffrey S. Chase,et al.  The role of accountability in dependable distributed systems , 2005 .

[36]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.