skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: iSSH v. Auditd: Intrusion Detection in High Performance Computing

Conference ·
OSTI ID:1048673

The goal is to provide insight into intrusions in high performance computing, focusing on tracking intruders motions through the system. The current tools, such as pattern matching, do not provide sufficient tracking capabilities. We tested two tools: an instrumented version of SSH (iSSH) and Linux Auditing Framework (Auditd). First discussed is Instrumented Secure Shell (iSSH): a version of SSH developed at Lawrence Berkeley National Laboratory. The goal is to audit user activity within a computer system to increase security. Capabilities are: Keystroke logging, Records user names and authentication information, and Catching suspicious remote and local commands. Strengths for iSSH are: (1) Good for keystroke logging, making it easier to track malicious users by catching suspicious commands; (2) Works with Bro to send alerts; could be configured to send pages to systems administrators; and (3) Creates visibility into SSH sessions. Weaknesses are: (1) Relatively new, so not very well documented; and (2) No capabilities to see if files have been edited, moved, or copied within the system. Second we discuss Auditd, the user component of the Linux Auditing System. It creates logs of user behavior, and monitors systems calls and file accesses. Its goal is to improve system security by keeping track of users actions within the system. Strenghts of Auditd are: (1) Very thorough logs; (2) Wider variety of tracking abilities than iSSH; and (3) Older, so better documented. Weaknesses are: (1) Logs record everything, not just malicious behavior; (2) The size of the logs can lead to overflowing directories; and (3) This level of logging leads to a lot of false alarms. Auditd is better documented than iSSH, which would help administrators during set up and troubleshooting. iSSH has a cleaner notification system, but the logs are not as detailed as Auditd. From our performance testing: (1) File transfer speed using SCP is increased when using iSSH; and (2) Network benchmarks were roughly the same regardless of which tool was running.

Research Organization:
Los Alamos National Laboratory (LANL), Los Alamos, NM (United States)
Sponsoring Organization:
DOE/LANL
DOE Contract Number:
AC52-06NA25396
OSTI ID:
1048673
Report Number(s):
LA-UR-12-23588; TRN: US201216%%1079
Resource Relation:
Conference: Computing and Information Technology Student Mini Showcase ; 2012-08-02 - 2012-08-02 ; Los Alamos, New Mexico, United States
Country of Publication:
United States
Language:
English

Similar Records

Instrumented OpenSSH
Software · Tue Feb 24 00:00:00 EST 2009 · OSTI ID:1048673

Instrumented SSH
Technical Report · Wed May 27 00:00:00 EDT 2009 · OSTI ID:1048673

Exe-Guard Project
Technical Report · Sat Jan 30 00:00:00 EST 2016 · OSTI ID:1048673