METAL - A tool for extracting attack manifestations

5Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As manual analysis of attacks is time consuming and requires expertise, we developed a partly automated tool for extracting manifestations of intrusive behaviour from audit records, METAL (Manifestation Extraction Tool for Analysis of Logs). The tool extracts changes in audit data that are caused by an attack. The changes are determined by comparing data generated during normal operation to data generated during a successful attack. METAL identifies all processes that may be affected by the attack and the specific system call sequences, arguments and return values that are changed by the attack and makes it possible to analyse many attacks in a reasonable amount of time. Thus it is quicker and easier to find groups of attacks with similar properties and the automation of the process makes attack analysis considerably easier. We tested the tool in analyses of five different attacks and found that it works well, is considerably less time consuming and gives a better overview of the attacks than manual analysis. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Larson, U., Lundin-Barse, E., & Jonsson, E. (2005). METAL - A tool for extracting attack manifestations. In Lecture Notes in Computer Science (Vol. 3548, pp. 85–102). Springer Verlag. https://doi.org/10.1007/11506881_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free