Track 1: Scalable Observation infrastructure - Low disturbance multi-level observation and production of enhanced data

The objective of this track is to efficiently capture and merge online observations made anywhere in the system (alerts, events, and states) by many selected relevant surveillance systems (AV, HIDS, performance monitor systems, software tracers and profilers, and in-system peeks) into an enhanced data that is the most appropriate for detection analysis. This will allow quasi-real-time feedback-directed observation (online control of software tracer probes according to the new situations) and saving selected data on disk for further offline analysis (forensics, software improvement).

Large installations, whether for telecom systems or government infrastructure, need the ability to closely monitor each node with low, almost negligible, overhead in order to monitor the performance and behavior of the system and detect possible anomalies. Anomalies may be caused by unusually high demand, security attacks, defective hardware or software, or improper configuration. The extent and precision of the observation data is key to maximize the possibility of anomaly detection. Previous work concentrated on obtaining low overhead detailed execution traces from kernel and user-space static trace-points which can be activated dynamically and remotely.

Proposed work will concentrate on getting additional sources of information, including interfaces to existing systems (AV, HIDS), dynamic tracepoints, performance counters samples, information from I/O subsystems (bus, disk subsystem, network adapter...), and in-kernel peeks (observation of variables in the kernel). The main challenge is to design proper algorithms to achieve extremely low overhead even for complex, heterogeneous many-core architectures with multiple levels of virtualization (e.g. Kernel Virtual Machine, Java Virtual Machine). This highly efficient and accurate infrastructure for host tracing must be able to integrate sources of information (events and states) from all levels (hardware, operating system, applications, Anti-Virus scans, Host based Intrusion Detection Systems) and be suitable to interoperate in large distributed systems (e.g. cluster/cloud).

 

Team members

Jean-Christian Kouamé École Polytechnique de Montréal Master Student

 

Documents and presentations

A domain specific language for pattern matching, filtering and analysis of execution traces

.(Not yet published)

LANGAGE DÉDIÉ ET ANALYSE AUTOMATISÉE POUR LA DÉTECTION DE PATRONS AU SEIN DE TRACES D'EXÉCUTION

.(Not yet published)

Efficient Methods for Trace Analysis Parallelization

.(Not yet published)

Model-driven engineering support

Tracing GPUs

Parallellisation of analysis with Babeltrace

LTTng Update

Comparision of 2 program executions from their traces

Parallellisation of analysis with Babeltrace

Pages