Kerf, a security-log visualization tool (2003-2005)

This project is no longer active; this page is no longer updated.

Related keywords: [security]


Summary

The text on this page was written contemporaneous to the project.

Kerf (formerly known as Sawmill) is a set of tools designed to help system administrators analyze intrusions in their network of workstations. Our tools collect host and network log data in secure databases, allow administrators sophisticated searches using our SQL-language variant (SawQL, pronounced saw-kwill), and present the results through a browsable graphical interface. We view the SawQL inquiry as a representation of the sysadmin's hypothesis about the intrusion; our tools interactively refine that hypothesis to a more precise picture of the attack. All results may be recorded for future reference or referral to authorities.

Project Goals

Given:

Answer questions:

More Specifically:

Research Outcome

New Intrusion Analysis Tools

Old Process

Iterative hypothesis refinement

New Process

Iterative hypothesis refinement

Automated hypothesis refinement

Unique Contributions and Deliverables

Relevance (Government and Industry)

Relationship with other projects

Intrusion detection systems

Internet Detection Working Group of Internet Engineering Task Force

MIT Lincoln Labs

NIST

CERT

Summary


Talk slides


People

Jay Aslam, Sergey Bratus, Marco Cremonini, David Kotz, Kevin Mitcham, Ron Peterson, Daniela Rus, Brett Tofel, and students Kyle Smith, Virgil Pavlu, and Wei Zhang.

Funding and acknowledgements

The Kerf project was supported by Dartmouth's Institute for Security Technology Studies (ISTS) with funds from the US Department of Homeland Security (Office for Domestic Preparedness), under award number 2000-DT-CX-K001.

The views and conclusions contained on this site and in its documents are those of the authors and should not be interpreted as necessarily representing the official position or policies, either expressed or implied, of the sponsor(s). Any mention of specific companies or products does not imply any endorsement by the authors or by the sponsor(s).


Papers (tagged 'kerf')

[Also available in BibTeX]

Papers are listed in reverse-chronological order; click an entry to pop up the abstract. For full information and pdf, please click Details link. Follow updates with RSS.

2005:
Javed Aslam, Sergey Bratus, David Kotz, Ronald Peterson, and Daniela Rus. The Kerf toolkit for intrusion analysis. IAnewsletter. Summer 2005. [Details]
2004:
Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus, and Brett Tofel. The Kerf toolkit for intrusion analysis. IEEE Security and Privacy. November 2004. [Details]

We consider the problem of intrusion analysis and present the Kerf Toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf Toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.

Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, and Daniela Rus. Kerf: Machine Learning to Aid Intrusion Analysts. Proceedings of the USENIX Security Symposium. August 2004. Work-in-progress report. [Details]
Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus, and Brett Tofel. The Kerf toolkit for intrusion analysis. Technical Report, March 2004. [Details]

We consider the problem of intrusion analysis and present the Kerf Toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf Toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.

2003:
Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus, and Brett Tofel. The Kerf toolkit for intrusion analysis (Poster abstract). Proceedings of the IEEE Workshop on Information Assurance. June 2003. [Details]

We consider the problem of intrusion analysis and present the Kerf toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf in detail, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.


[Kotz research]