Hadoop Development - CSC
Hadoop Development - CSC
Hadoop Development - CSC
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Real world example - a Cyber problem (cont’d)<br />
• The problem can addressed by processing the audit logs produced by the<br />
auditd daemon that is supplied with Linux kernels 2.6.x (or newer).<br />
• In order to get auditd to log the data we are interested in it is necessary to<br />
set up rules in /etc/audit/audit.rules on each server as specified in the<br />
NSA document<br />
“Guide to the Secure Configuration of Red Hat Enterprise Linux 5, Revision 4,<br />
September 14, 2010”<br />
• The data to process looks something like this:<br />
TBSC 2009<br />
11/10/2011 12:53 PM 0725-23_TBSC 2009 23