The Kerf toolkit for intrusion analysis


Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus, and Brett Tofel. The Kerf toolkit for intrusion analysis. IEEE Security and Privacy, volume 2, number 6, pages 42–52. IEEE, November 2004. doi:10.1109/MSP.2004.113. ©Copyright IEEE. Revision of aslam:toolkit-p. Later revised as aslam:toolkit-tr.


We consider the problem of intrusion analysis and present the Kerf Toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf Toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.

Citable with [BibTeX]

Projects: [kerf]

Keywords: [security]

Available from the publisher: [DOI]

Available from the author: [bib]
The publisher does not allow us to post a pdf copy; contact me if you are unable to obtain a copy from the publisher.

[Kotz research]