Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices

It is common today in large corporate environments for system administrators to employ centralized systems for log collection and analysis. The log data can come from any device between smart-phones and large scale server clusters. During an investigation of a system failure or suspected intrusion t...

Full description

Bibliographic Details
Main Authors: Andersson, Marcus, Nilsson, Alexander
Format: Others
Language:English
Published: Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik 2014
Subjects:
TPM
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3994
id ndltd-UPSALLA1-oai-DiVA.org-bth-3994
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-bth-39942018-01-12T05:14:06ZImproving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected DevicesengFörbättring av integritetsförsäkring av loggar sett från tillfälligt bortkopplade enheterAndersson, MarcusNilsson, AlexanderBlekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknikBlekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik2014Secure loggingforward securityTPMdigital signatureComputer SciencesDatavetenskap (datalogi)Software EngineeringProgramvaruteknikIt is common today in large corporate environments for system administrators to employ centralized systems for log collection and analysis. The log data can come from any device between smart-phones and large scale server clusters. During an investigation of a system failure or suspected intrusion these logs may contain vital information. However, the trustworthiness of this log data must be confirmed. The objective of this thesis is to evaluate the state of the art and provide practical solutions and suggestions in the field of secure logging. In this thesis we focus on solutions that do not require a persistent connection to a central log management system. To this end a prototype logging framework was developed including client, server and verification applications. The client employs different techniques of signing log entries. The focus of this thesis is to evaluate each signing technique from both a security and performance perspective. This thesis evaluates "Traditional RSA-signing", "Traditional Hash-chains"', "Itkis-Reyzin's asymmetric FSS scheme" and "RSA signing and tick-stamping with TPM", the latter being a novel technique developed by us. In our evaluations we recognized the inability of the evaluated techniques to detect so called `truncation-attacks', therefore a truncation detection module was also developed which can be used independent of and side-by-side with any signing technique. In this thesis we conclude that our novel Trusted Platform Module technique has the most to offer in terms of log security, however it does introduce a hardware dependency on the TPM. We have also shown that the truncation detection technique can be used to assure an external verifier of the number of log entries that has at least passed through the log client software. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:bth-3994Local oai:bth.se:arkivex950FE85ABF96F623C1257D0E005EEF31application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic Secure logging
forward security
TPM
digital signature
Computer Sciences
Datavetenskap (datalogi)
Software Engineering
Programvaruteknik
spellingShingle Secure logging
forward security
TPM
digital signature
Computer Sciences
Datavetenskap (datalogi)
Software Engineering
Programvaruteknik
Andersson, Marcus
Nilsson, Alexander
Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices
description It is common today in large corporate environments for system administrators to employ centralized systems for log collection and analysis. The log data can come from any device between smart-phones and large scale server clusters. During an investigation of a system failure or suspected intrusion these logs may contain vital information. However, the trustworthiness of this log data must be confirmed. The objective of this thesis is to evaluate the state of the art and provide practical solutions and suggestions in the field of secure logging. In this thesis we focus on solutions that do not require a persistent connection to a central log management system. To this end a prototype logging framework was developed including client, server and verification applications. The client employs different techniques of signing log entries. The focus of this thesis is to evaluate each signing technique from both a security and performance perspective. This thesis evaluates "Traditional RSA-signing", "Traditional Hash-chains"', "Itkis-Reyzin's asymmetric FSS scheme" and "RSA signing and tick-stamping with TPM", the latter being a novel technique developed by us. In our evaluations we recognized the inability of the evaluated techniques to detect so called `truncation-attacks', therefore a truncation detection module was also developed which can be used independent of and side-by-side with any signing technique. In this thesis we conclude that our novel Trusted Platform Module technique has the most to offer in terms of log security, however it does introduce a hardware dependency on the TPM. We have also shown that the truncation detection technique can be used to assure an external verifier of the number of log entries that has at least passed through the log client software.
author Andersson, Marcus
Nilsson, Alexander
author_facet Andersson, Marcus
Nilsson, Alexander
author_sort Andersson, Marcus
title Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices
title_short Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices
title_full Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices
title_fullStr Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices
title_full_unstemmed Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices
title_sort improving integrity assurances of log entries from the perspective of intermittently disconnected devices
publisher Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik
publishDate 2014
url http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3994
work_keys_str_mv AT anderssonmarcus improvingintegrityassurancesoflogentriesfromtheperspectiveofintermittentlydisconnecteddevices
AT nilssonalexander improvingintegrityassurancesoflogentriesfromtheperspectiveofintermittentlydisconnecteddevices
AT anderssonmarcus forbattringavintegritetsforsakringavloggarsettfrantillfalligtbortkoppladeenheter
AT nilssonalexander forbattringavintegritetsforsakringavloggarsettfrantillfalligtbortkoppladeenheter
_version_ 1718606872630525952