LUARM[1] (Logging User Actions in Relational Mode) is an Open Source experimental live digital forensics engine that produces audit data[2] that facilitate insider threat specification as well as user action computer forensic functionality for the Linux operating system. It is designed to log in detail user activities into a simple Relational Database Management System (RDBMS) schema. MySQL is used for the relational backend although the schema could be easily converted to PostgreSQL and other popular relational databases. LUARM is written in Perl and provides a near real-time snapshot of file access, process/program execution and network endpoint user activities[3] organized in well-defined relational table formats. The purposes are:

  • To assist system administrators and data security officers in the process of detecting and preventing external and internal threats to Linux based devices.
  • To provide a well defined easy-to-parse audit record structure, as well as scalable and reliable storage for the logged data.
  • Since the logged data are stored away from the monitored linux devices, LUARM can act as a valuable complement to existing data forensic investigation tools. This is because it is immune to the “observer effect” and the dangers of “static” forensic analysis: dynamic information about file, network and process activity is not lost and examining/logging data does not affect the source media state[4]).

LUARM is being developed by Georgios Magklaras at Steelcyber Scientific,[5] an IT consultancy specializing in information security and scientific computing. It is part of a wider Insider Misuse research effort targeting insider misuse threat specification.[6]

References

edit
  1. ^ The LUARM project page at Sourceforge.net.
  2. ^ Bace R. (2000), “Intrusion Detection”, First Edition, Macmillan Technical Publishing, Indianapolis, USA, ISBN 1-57870-185-6: Chapter 3 discusses audit records and engines in detail
  3. ^ Magklaras et al (2011), "LUARM: An Audit Engine for Insider Misuse Detection", International Journal of Digital Crime and Forensics, volume 3, issue 3, pp 37-49
  4. ^ Hay B., Nance K., Bishop M. (2009), “Live Analysis Progress and Challenges”, IEEE Security & Privacy, Volume 7, Number 2, pages 30-37.
  5. ^ Scientific, Steelcyber. "Welcome to Steelcyber Scientific". www.steelcyber.com. Retrieved 2018-05-24.
  6. ^ Book Chapter: Insider Threat Specification as a Threat Mitigation Technique, Advances in Information Security, Vol 49: Title: Insider Threats in Cyber Security, Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter (Eds.) 2010, XII, 244 p. 40 illus., 20 in color., ISBN 978-1-4419-7132-6, Hardcover, Springer 2010.