SlideShare a Scribd company logo
Submit Search
Upload
Cloud Application Logging for Forensics
Report
Raffael Marty
GeneralManager Cybersecurity at ConnectWise
Follow
•
3 likes
•
2,437 views
1
of
17
Cloud Application Logging for Forensics
•
3 likes
•
2,437 views
Download Now
Download to read offline
Report
Technology
Business
Raffael Marty
GeneralManager Cybersecurity at ConnectWise
Follow
Recommended
Cloud Log Analysis and Visualization
Raffael Marty
4.7K views
•
43 slides
Mining Your Logs - Gaining Insight Through Visualization
Raffael Marty
7.4K views
•
56 slides
The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...
DataWorks Summit
1.6K views
•
26 slides
Integrating Apache Spark and NiFi for Data Lakes
DataWorks Summit/Hadoop Summit
10.9K views
•
18 slides
Workshop slides
Rishabh Jain
319 views
•
33 slides
Integração de Dados com Apache NIFI - Marco Garcia Cetax
Marco Garcia
565 views
•
35 slides
More Related Content
What's hot
How to Use Innovative Data Handling and Processing Techniques to Drive Alpha ...
DataWorks Summit
440 views
•
39 slides
Storage Requirements and Options for Running Spark on Kubernetes
DataWorks Summit
889 views
•
13 slides
Breathing New Life into Apache Oozie with Apache Ambari Workflow Manager
DataWorks Summit
517 views
•
28 slides
Benefits of an Agile Data Fabric for Business Intelligence
DataWorks Summit/Hadoop Summit
901 views
•
38 slides
Data processing at the speed of 100 Gbps@Apache Crail (Incubating)
DataWorks Summit
991 views
•
43 slides
Accelerating query processing with materialized views in Apache Hive
DataWorks Summit
5.4K views
•
30 slides
What's hot
(20)
How to Use Innovative Data Handling and Processing Techniques to Drive Alpha ...
DataWorks Summit
•
440 views
Storage Requirements and Options for Running Spark on Kubernetes
DataWorks Summit
•
889 views
Breathing New Life into Apache Oozie with Apache Ambari Workflow Manager
DataWorks Summit
•
517 views
Benefits of an Agile Data Fabric for Business Intelligence
DataWorks Summit/Hadoop Summit
•
901 views
Data processing at the speed of 100 Gbps@Apache Crail (Incubating)
DataWorks Summit
•
991 views
Accelerating query processing with materialized views in Apache Hive
DataWorks Summit
•
5.4K views
Apache Atlas: Why Big Data Management Requires Hierarchical Taxonomies
DataWorks Summit/Hadoop Summit
•
5.4K views
Solr + Hadoop: Interactive Search for Hadoop
gregchanan
•
2.4K views
Enterprise IIoT Edge Processing with Apache NiFi
Timothy Spann
•
1.1K views
Introduction to Apache NiFi And Storm
Jungtaek Lim
•
1.4K views
Avoiding big data antipatterns
grepalex
•
11.9K views
Avoiding Log Data Overload in a CI/CD System While Streaming 190 Billion Even...
DataWorks Summit
•
305 views
Apache NiFi in the Hadoop Ecosystem
DataWorks Summit/Hadoop Summit
•
4.8K views
Achieving a 360-degree view of manufacturing via open source industrial data ...
DataWorks Summit
•
870 views
Apache NiFi Crash Course Intro
DataWorks Summit/Hadoop Summit
•
6.8K views
Accelerating Apache Hadoop through High-Performance Networking and I/O Techno...
DataWorks Summit/Hadoop Summit
•
1.4K views
Transactional operations in Apache Hive: present and future
DataWorks Summit
•
4.8K views
The First Mile – Edge and IoT Data Collection with Apache NiFi and MiNiFi
DataWorks Summit
•
2.8K views
LLAP: Sub-Second Analytical Queries in Hive
DataWorks Summit/Hadoop Summit
•
1.6K views
Building Data Pipelines for Solr with Apache NiFi
Bryan Bende
•
11.3K views
Viewers also liked
11.cyber forensics in cloud computing
Alexander Decker
635 views
•
9 slides
Cloud Forensics- An IS Approach
IOSR Journals
526 views
•
4 slides
Adding event reconstruction to a cloud forensic readiness
Victor Kebande
486 views
•
13 slides
Cloud Computing Forensic Science
David Sweigert
1.4K views
•
10 slides
Memory forensics using VMI for cloud computing
Priyanka Aash
793 views
•
39 slides
Cloud Monitoring And Forensic Using Security Metrics
Sandeep Saxena
742 views
•
14 slides
Viewers also liked
(8)
11.cyber forensics in cloud computing
Alexander Decker
•
635 views
Cloud Forensics- An IS Approach
IOSR Journals
•
526 views
Adding event reconstruction to a cloud forensic readiness
Victor Kebande
•
486 views
Cloud Computing Forensic Science
David Sweigert
•
1.4K views
Memory forensics using VMI for cloud computing
Priyanka Aash
•
793 views
Cloud Monitoring And Forensic Using Security Metrics
Sandeep Saxena
•
742 views
Cloud Forensics
sdavis532
•
2.7K views
(130928) #fitalk cloud storage forensics - dropbox
INSIGHT FORENSIC
•
527 views
Similar to Cloud Application Logging for Forensics
Oracle Management Cloud
Dheeraj Hiremath
204 views
•
25 slides
Oracle Management Cloud
Dheeraj Hiremath
256 views
•
25 slides
Logging from the bottom up
Francis Edwards
85 views
•
18 slides
MuleSoft Manchester Meetup #2 slides 29th October 2019
Ieva Navickaite
811 views
•
75 slides
Hadoop, hive和scribe在运维方面的应用
xshadowxc
936 views
•
38 slides
Security Practices - Logging.pptx
Alireza Vafi
12 views
•
29 slides
Similar to Cloud Application Logging for Forensics
(20)
Oracle Management Cloud
Dheeraj Hiremath
•
204 views
Oracle Management Cloud
Dheeraj Hiremath
•
256 views
Logging from the bottom up
Francis Edwards
•
85 views
MuleSoft Manchester Meetup #2 slides 29th October 2019
Ieva Navickaite
•
811 views
Hadoop, hive和scribe在运维方面的应用
xshadowxc
•
936 views
Security Practices - Logging.pptx
Alireza Vafi
•
12 views
IoT Ingestion & Analytics using Apache Apex - A Native Hadoop Platform
Apache Apex
•
880 views
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Glen Roberts, CISSP
•
835 views
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
Ruby Meditation
•
455 views
NTTドコモ様 導入事例 OpenStack Summit 2015 Tokyo 講演「After One year of OpenStack Cloud...
VirtualTech Japan Inc.
•
12.8K views
Technology behind-real-time-log-analytics
Data Science Thailand
•
1.1K views
tranSMART Community Meeting 5-7 Nov 13 - Session 3: Clinical Biomarker Discovery
David Peyruc
•
1.3K views
Application Logging for Forensics
Raffael Marty
•
3.4K views
Monitoring system for OpenStack,using a OSS products
satsuki fukazu
•
1.1K views
MySQL Cluster
Abel Flórez
•
295 views
Nagios Conference 2014 - Frank Pantaleo - Nagios Monitoring of Netezza Databases
Nagios
•
861 views
John adams talk cloudy
John Adams
•
3.3K views
Cashing in on logging and exception data
Stackify
•
1.1K views
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Andrejs Prokopjevs
•
2.6K views
Meetup milano #4 log management and anypoint advanced monitoring
Gonzalo Marcos Ansoain
•
540 views
More from Raffael Marty
Exploring the Defender's Advantage
Raffael Marty
137 views
•
36 slides
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Raffael Marty
962 views
•
19 slides
How To Drive Value with Security Data
Raffael Marty
3.4K views
•
7 slides
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
6.4K views
•
30 slides
Artificial Intelligence – Time Bomb or The Promised Land?
Raffael Marty
1K views
•
20 slides
Understanding the "Intelligence" in AI
Raffael Marty
942 views
•
12 slides
More from Raffael Marty
(20)
Exploring the Defender's Advantage
Raffael Marty
•
137 views
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Raffael Marty
•
962 views
How To Drive Value with Security Data
Raffael Marty
•
3.4K views
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
•
6.4K views
Artificial Intelligence – Time Bomb or The Promised Land?
Raffael Marty
•
1K views
Understanding the "Intelligence" in AI
Raffael Marty
•
942 views
Security Chat 5.0
Raffael Marty
•
449 views
AI & ML in Cyber Security - Why Algorithms are Dangerous
Raffael Marty
•
7.2K views
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
•
13.9K views
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty
•
3.7K views
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty
•
4.5K views
Security Insights at Scale
Raffael Marty
•
2.5K views
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
•
2.7K views
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
•
25.2K views
Visualization in the Age of Big Data
Raffael Marty
•
6.9K views
Big Data Visualization
Raffael Marty
•
41.5K views
The Heatmap - Why is Security Visualization so Hard?
Raffael Marty
•
2.5K views
Workshop: Big Data Visualization for Security
Raffael Marty
•
22.1K views
Visualization for Security
Raffael Marty
•
7.7K views
The Heatmap - Why is Security Visualization so Hard?
Raffael Marty
•
8K views
Recently uploaded
"How we switched to Kanban and how it integrates with product planning", Vady...
Fwdays
60 views
•
24 slides
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
188 views
•
10 slides
.conf Go 2023 - Raiffeisen Bank International
Splunk
186 views
•
16 slides
GigaIO: The March of Composability Onward to Memory with CXL
CXL Forum
122 views
•
12 slides
"Role of a CTO in software outsourcing company", Yuriy Nakonechnyy
Fwdays
38 views
•
21 slides
Liqid: Composable CXL Preview
CXL Forum
120 views
•
8 slides
Recently uploaded
(20)
"How we switched to Kanban and how it integrates with product planning", Vady...
Fwdays
•
60 views
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
•
188 views
.conf Go 2023 - Raiffeisen Bank International
Splunk
•
186 views
GigaIO: The March of Composability Onward to Memory with CXL
CXL Forum
•
122 views
"Role of a CTO in software outsourcing company", Yuriy Nakonechnyy
Fwdays
•
38 views
Liqid: Composable CXL Preview
CXL Forum
•
120 views
Java 21 and Beyond- A Roadmap of Innovations .pdf
Ana-Maria Mihalceanu
•
54 views
[2023] Putting the R! in R&D.pdf
Eleanor McHugh
•
36 views
Throughput
Moisés Armani Ramírez
•
31 views
PyCon ID 2023 - Ridwan Fadjar Septian.pdf
Ridwan Fadjar
•
165 views
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk
•
82 views
Data-centric AI and the convergence of data and model engineering:opportunit...
Paolo Missier
•
25 views
Micron CXL product and architecture update
CXL Forum
•
23 views
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada
•
103 views
MemVerge: Memory Viewer Software
CXL Forum
•
117 views
.conf Go 2023 - Data analysis as a routine
Splunk
•
85 views
CXL at OCP
CXL Forum
•
203 views
Astera Labs: Intelligent Connectivity for Cloud and AI Infrastructure
CXL Forum
•
125 views
.conf Go 2023 - SIEM project @ SNF
Splunk
•
178 views
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver
•
24 views
Cloud Application Logging for Forensics
1.
Cloud Application Logging
For Forensics Raffael Marty - @zrlram ACM SAC 2011, Taichung - Taiwan Saturday, March 26, 2011
2.
Agenda
Guidelines for logging infrastructures and application development To enable the forensic process •The Cloud and its Logs •Logging Architecture •Logging Guidelines •Reference Setup Logging as a Service 2 © by Raffael Marty Saturday, March 26, 2011
3.
Logs for Computer
Forensics • Logs are part of the forensic process • Problems: 2010-12-28T18:15:53.258+00:00 frontend2-raffy syslog-ng[19632]: The current log file has a mismatching size/inode information, restarting from the beginning; filename='/mnt/log/apache2/www- access.log' 2010-12-28T18:15:53.258+00:00 frontend2-raffy syslog-ng[19632]: Follow-mode file source not found, - can’t find logs deferring open; filename='/mnt/log/apache2/www-error.log' 2010-12-28T18:15:53.258+00:00 frontend2-raffy syslog-ng[19632]: The current log file has a mismatching size/inode information, restarting from the beginning; filename='/mnt/log/apache2/www- error.log' - logs got deleted 2010-12-28T18:15:53.258+00:00 frontend2-raffy syslog-ng[19632]: The current log file has a mismatching size/inode information, restarting from the beginning; filename='/mnt/log/apache2/ access.log' 2010-12-28T18:15:53.258+00:00 frontend2-raffy syslog-ng[19632]: The current log file has a - logs never got generated mismatching size/inode information, restarting from the beginning; filename='/mnt/log/apache2/ error.log' - logs are incomplete (e.g., no user name) - log format is unknown - archival and retention of logs (how long?) - knowledge of logging configuration - non compatible and random log formats (make correlation impossible) Logging as a Service 3 © by Raffael Marty Saturday, March 26, 2011
4.
The Cloud
IaaS - Infrastructure Complete control OS up PaaS - Platform No control over OS SaaS - Software No or very limited control LaaS - Logging Logging as a Service 4 © by Raffael Marty Saturday, March 26, 2011
5.
Logs in the
Cloud • Generally no infrastructure logs! - Routers, Firewalls, Load balancers, etc. • PaaS only limited access to OS logging • SaaS generally no access to any logs • Volatility of machines / logs • Highly decentralized Logging as a Service 5 © by Raffael Marty Saturday, March 26, 2011
6.
Applications Enable Visibility
• If you can’t control the infrastructure, control your applications • Application logging - needs guidelines - better tools - education of developers and students? Raffael Marty - @zrlram 6 Saturday, March 26, 2011
7.
What?
Mar 16 08:09:58 kernel: [! 0.000000] Normal! 1048576 -> 1048576 Logging as a Service 7 © by Raffael Marty Saturday, March 26, 2011
8.
Logging Guidelines
• When • What • How 8 Saturday, March 26, 2011
9.
When to Log
• Operations based logging - Errors are problems that impact a single application user - Critical conditions: situations that impacts all users of the application - System and application start, stop, and restart. - Changes to objects - attribute changes to an activity ‣ Installation of a new application ‣ Configuration change ‣ Logging program code updates ‣ Backup runs ‣ Audit of log access Logging as a Service 9 © by Raffael Marty Saturday, March 26, 2011
10.
When to Log
• Security (forensics) related logging - Login / logout (local and remote) - Password changes / authorization changes - Failed resource access (denied authorization) - All activity executed by a privileged account • Regulatory and standards mandates - SOX (Financial system access) - PCI (Cardholder data access) - etc. • Business relevant logging Logging as a Service 10 © by Raffael Marty Saturday, March 26, 2011
11.
What to Log
when, what, who, and why debug info warn • Timestamp 2010-05-13 13:03:47.123231PDT error crit • Severity info see topic of event • Categorization object=input, action=create, status=success categorization • Application loggly-indexing • User zrlram across tiers • Session ID 08BaswoAAQgAADVDG3IAAAAD and applications! • Reason - Logging as a Service 11 © by Raffael Marty Saturday, March 26, 2011
12.
How to Log
• Machine processable - field-identification - speed • Field normalization - ranges (high, medium, low ==> 5, 3, 1) - terms (dropped, blocked, drop, denied) • Encoding, see existing standards (e.g., syslog, CEE) Logging as a Service 12 © by Raffael Marty Saturday, March 26, 2011
13.
Log Formats
- simple text --> key-value time=2010-05-13 13:03:47.123231PDT,session_id=08AADVDG3IAAAAD,severity=ERROR,user=zrlram, object=customer,action=delete,status=failure, reason=does not exist - expressive text --> JSON {“time”:”2010-05-13 13:03:47.123231PDT”,“session_id”:”08AADVDG3IAAAAD”, “severity”=”ERROR”,”user”=”zrlram”,“category”: {“object”:”customer”,”action”:”delete”, ”status”:”failure”}, “reason”:”does not exist”} - binary --> special encoding Logging as a Service 13 © by Raffael Marty Saturday, March 26, 2011
14.
Logging Architecture
• Enable logging • Log transport - tcp vs. udp vs. relp vs. http? - encryption and compression? - Synchronized clocks across components • Centralization of logs - preserve integrity • Tune logging configurations - based on use-cases Logging as a Service 14 © by Raffael Marty Saturday, March 26, 2011
15.
Reference Setup
Clients: JavaScript Elastic LoadBalancer Amazon RDS Frontends: Apache, Django Backend: Java - log4j Across machines: collectd, puppet, OS syslog Logging as a Service 15 © by Raffael Marty Saturday, March 26, 2011
16.
Future Work
Analyzing framework for forensic log analysis -security visualization (see http://secviz.org) -forensic timeline analysis -log review mobile-166 My syslog -log correlation -policy monitoring Logging as a Service 16 © by Raffael Marty Saturday, March 26, 2011
17.
We are hiring!
about.me/raffy 17 Saturday, March 26, 2011