Traceback: A Forensic Tool for Distributed Systems

In spite of stringent security measures on the components of a distributed system and well-defined communication procedures between the nodes of the system, an exploit may be found that compromises a node, and may be propagated to other nodes. This paper describes an incident-response method to analyse an attack. The analysis is required to patch the vulnerabilities and may be helpful in finding and removing backdoors installed by the attacker. This analysis is done by logging all relevant information of each node in the system at regular intervals at a centralised store. The logs are compressed and sent in order to reduce network traffic and use lesser storage space. The state of the system is also stored at regular intervals. This information is presented by a replay tool in a lucid, comprehensible manner using a timeline. The timeline shows the saved system states (of each node in the distributed system) as something similar to checkpoints. The events and actions stored in the logs act on these states and this shows a replay of the events to the analyser. A time interval during which an attack that took place is suspected to have occurred can be analysed thoroughly using this tool.

[1]  Hai Jin,et al.  Distributed agent-based real time network intrusion forensics system architecture design , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[2]  Luca Spalazzi,et al.  IRSS: Incident Response Support System , 2006, International Symposium on Collaborative Technologies and Systems (CTS'06).

[3]  Jakub Swacha,et al.  Fast and Efficient Log File Compression , 2007, ADBIS Research Communications.

[4]  Jill Slay,et al.  Achieving critical infrastructure protection through the interaction of computer security and network forensics , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[5]  Ramendra K. Sahoo,et al.  Lossless compression for large scale cluster logs , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.