13.11.2012 Views

Hadoop Development - CSC

Hadoop Development - CSC

Hadoop Development - CSC

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Real world example - a Cyber problem (cont’d)<br />

• The problem can addressed by processing the audit logs produced by the<br />

auditd daemon that is supplied with Linux kernels 2.6.x (or newer).<br />

• In order to get auditd to log the data we are interested in it is necessary to<br />

set up rules in /etc/audit/audit.rules on each server as specified in the<br />

NSA document<br />

“Guide to the Secure Configuration of Red Hat Enterprise Linux 5, Revision 4,<br />

September 14, 2010”<br />

• The data to process looks something like this:<br />

TBSC 2009<br />

11/10/2011 12:53 PM 0725-23_TBSC 2009 23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!