On the inadequacy of open-source application logs for digital forensics

Azahari, Afiqah; Balzarotti, Davide
Forensic Science International: Digital Investigation, Vol. 49, June 2024

This study explores the challenges with utilizing application logs for incident response or forensic analysis. Application logs have the potential to significantly enhance security analysis as sometimes they provide information regarding user actions, error messages, and performance metrics of the application. Although these logs can offer vital information about user activities, errors, and application performance, their use for security needs better understanding. We looked at the current logging implementation of 60 open-source applications. We checked the logs to see if they could help with five key security tasks: making timelines, linking events, separating different actions, spotting misuse, and detecting attacks. By examining source code, extracting log statements, and evaluating them for security relevance, we found many logs lacked essential elements. Specifically, 29 applications omitted timestamps, crucial for identifying the timing of actions. Furthermore, logs frequently missed unique identifiers (UIDs) for event correlation, with 23 not noting UIDs for new activities. Inconsistent logging of user activities and an absence of logs detailing successful attacks indicate current application logs need significant enhancements to be effective for security checks. The findings of our research suggest that current application logs are inadequately equipped for in-depth security analysis. Enhancements are imperative for their optimal utility. This investigation underscores the inherent challenges in leveraging logs for security and emphasizes the pressing need for refining logging methodologies.


DOI
Type:
Journal
Date:
2024-04-25
Department:
Data Science
Eurecom Ref:
7717
Copyright:
© Elsevier. Personal use of this material is permitted. The definitive version of this paper was published in Forensic Science International: Digital Investigation, Vol. 49, June 2024 and is available at : https://doi.org/10.1016/j.fsidi.2024.301750

PERMALINK : https://www.eurecom.fr/publication/7717