Show simple item record  

dc.contributor.authorLi, Xinen_NZ
dc.contributor.authorJoshi, Chaitanyaen_NZ
dc.contributor.authorTan, Alan Y.S.en_NZ
dc.contributor.authorKo, Ryan K.L.en_NZ
dc.coverage.spatialHelsinki, Finlanden_NZ
dc.date.accessioned2015-08-03T01:28:23Z
dc.date.available2015en_NZ
dc.date.available2015-08-03T01:28:23Z
dc.date.issued2015en_NZ
dc.identifier.citationLi, X., Joshi, C., Tan, A. Y. S., & Ko, R. K. L. (2015). Inferring User Actions from Provenance Logs. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2015 14th IEEE International Conference on. Helsinki, Finland: IEEE.en
dc.identifier.urihttps://hdl.handle.net/10289/9505
dc.description.abstractProgger, a kernel-spaced cloud data provenance logger which provides fine-grained data activity records, was recently developed to empower cloud stakeholders to trace data life cycles within and across clouds. Progger logs have the potential to allow analysts to infer user actions and create a data-centric behaviour history in a cloud computing environment. However, the Progger logs are complex and noisy and therefore, currently this potential can not be met. This paper proposes a statistical approach to efficiently infer the user actions from the Progger logs. Inferring logs which capture activities at kernel-level granularity is not a straightforward endeavour. This paper overcomes this challenge through an approach which shows a high level of accuracy. The key aspects of this approach are identifying the data preprocessing steps and attribute selection. We then use four standard classification models and identify the model which provides the most accurate inference on user actions. To our best knowledge, this is the first work of its kind. We also discuss a number of possible extensions to this work. Possible future applications include the ability to predict an anomalous security activity before it occurs.en_NZ
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.publisherIEEEen_NZ
dc.rightsThis is an author’s accepted version of an article published in the Proceedings of 2015 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.sourceThe 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)en_NZ
dc.titleInferring User Actions from Provenance Logsen_NZ
dc.typeConference Contribution
dc.identifier.doi10.1109/Trustcom.2015.442en_NZ
dc.relation.isPartOfTrust, Security and Privacy in Computing and Communications (TrustCom), 2015 14th IEEE International Conference onen_NZ
pubs.begin-page742en_NZ
pubs.elements-id121767
pubs.end-page749en_NZ
pubs.finish-date2015-08-22en_NZ
pubs.start-date2015-08-20en_NZ
pubs.volume1en_NZ


Files in this item

This item appears in the following Collection(s)

Show simple item record