DC ElementWertSprache
dc.contributor.authorVallentin, Matthias-
dc.contributor.authorCharousset, Dominik-
dc.contributor.authorSchmidt, Thomas C.-
dc.contributor.authorPaxson, Vern-
dc.contributor.authorWählisch, Matthias-
dc.date.accessioned2020-08-26T09:15:03Z-
dc.date.available2020-08-26T09:15:03Z-
dc.date.issued2014-
dc.identifier.issn0146-4833en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/913-
dc.description.abstractWhen an organization detects a security breach, it undertakes a forensic analysis to figure out what happened. This investigation involves inspecting a wide range of heterogeneous data sources spanning over a long period of time. The iterative nature of the analysis procedure requires an interactive experience with the data. However, the distributed processing paradigms we find in practice today fail to provide this requirement: the batch-oriented nature of MapReduce cannot deliver sub-second round-trip times, and distributed in-memory processing cannot store the terabytes of activity logs needed to inspect during an incident. We present the design and implementation of Visibility Across Space and Time~(VAST), a distributed database to support interactive network forensics, and libcppa, its exceptionally scalable messaging core. The extended actor framework libcppa enables VAST to distribute lightweight tasks at negligible overhead. In our live demo, we showcase how VAST enables security analysts to grapple with the huge amounts of data often associated with incident investigations.en
dc.language.isoenen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.ispartofACM SIGCOMM computer communication reviewen_US
dc.subjectSecurityen_US
dc.subjectNetwork Forensicsen_US
dc.subjectMessage-oriented Middlewareen_US
dc.subject.ddc004: Informatiken_US
dc.titleNative actors : how to scale network forensicsen
dc.typeinProceedingsen_US
dc.relation.conferenceSIGCOMM Chicago 2014en_US
dc.description.versionUnknownen_US
tuhh.container.endpage142en_US
tuhh.container.issue4en_US
tuhh.container.startpage141en_US
tuhh.container.volume44en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.doi10.1145/2740070.2631471-
tuhh.relation.ispartofseriesProceedings of the SIGCOMM Chicago 2014 & the best of the co-located workshopsen_US
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
item.grantfulltextnone-
item.creatorGNDVallentin, Matthias-
item.creatorGNDCharousset, Dominik-
item.creatorGNDSchmidt, Thomas C.-
item.creatorGNDPaxson, Vern-
item.creatorGNDWählisch, Matthias-
item.cerifentitytypePublications-
item.tuhhseriesidProceedings of the SIGCOMM Chicago 2014 & the best of the co-located workshops-
item.creatorOrcidVallentin, Matthias-
item.creatorOrcidCharousset, Dominik-
item.creatorOrcidSchmidt, Thomas C.-
item.creatorOrcidPaxson, Vern-
item.creatorOrcidWählisch, Matthias-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.fulltextNo Fulltext-
item.openairetypeinProceedings-
item.seriesrefProceedings of the SIGCOMM Chicago 2014 & the best of the co-located workshops-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

103
checked on 04.04.2025

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.