Hierarchical Attention-Based Anomaly Detection Model for Embedded Operating Systems

被引:15
作者
Ezeme, Mellitus O. [1 ]
Mahmoud, Qusay H. [1 ]
Azim, Akramul [1 ]
机构
[1] Univ Ontario Inst Technol, Dept Elect Comp & Software Engn, Oshawa, ON, Canada
来源
2018 IEEE 24TH INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA) | 2018年
基金
加拿大自然科学与工程研究理事会;
关键词
INTRUSION DETECTION;
D O I
10.1109/RTCSA.2018.00035
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Real-time embedded system applications have become pervasive, and with the increasing reliance on automated systems for both critical and non-critical tasks, the trend is set to continue. This growing reliance on real-time embedded systems, as well as the rise in the complexity of these systems, demands an efficient monitoring tool that takes the complex interactions in the system into consideration. These systems are well-specified, and there exists standard error or fault detection mechanism to detect when an anomaly occurs in the applications controlling the operation. Nonetheless, these anomaly detection mechanisms gather information about the behavior of the software against its intended goals through the use of plausibility checks which rely on a priori knowledge of the application behavior. This kind of test raises two issues: (1) there should be a complete characterization of the software to derive the redundant information needed for plausibility checks, (2) this test focuses mainly on detecting errors/faults/anomalies in a single application with no regard to other entities in the integrated system. On the other hand, an embedded real-time system (fitted with an operating system) usually has the operating system and the integrated application statically linked to produce a single executable image. This bespoke nature of the embedded real-time system design means that the kernel traces reflect the behavior of the application and the associated hardware components at every point in time. Consequently, detecting deviations in the kernel trace invariably imply system-wide anomaly detection in the associated application and hardware. Thus, this paper targets anomaly not just in the application layer, but also in other layers that make up the real-time embedded system. Therefore, we introduce a hierarchical attention-based anomaly detection (HAbAD) model based on stacked Long Short-Term Memory (LSTM) Networks with Attention. It is a closed-world prediction-classification model which uses the reconstruction error from a non-parametric kernel density estimator to detect when an anomaly has occurred. We show the effectiveness of this approach using publicly available dataset, and the results confirm that this is a robust means of detecting anomalies in real-time embedded systems.
引用
收藏
页码:225 / 231
页数:7
相关论文
共 21 条
[1]  
[Anonymous], 2015, P 2015 C EMPIRICAL M, DOI DOI 10.18653/V1/D15-1166
[2]  
Bahdanau D, 2016, Arxiv, DOI arXiv:1409.0473
[3]  
Chan W, 2016, INT CONF ACOUST SPEE, P4960, DOI 10.1109/ICASSP.2016.7472621
[4]   Anomaly Detection for Discrete Sequences: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (05) :823-839
[5]  
Cho K., 2014, ARXIV, DOI 10.3115/v1/w14-4012
[6]   Describing Multimedia Content Using Attention-Based Encoder-Decoder Networks [J].
Cho, Kyunghyun ;
Courville, Aaron ;
Bengio, Yoshua .
IEEE TRANSACTIONS ON MULTIMEDIA, 2015, 17 (11) :1875-1886
[7]   An Imputation-based Augmented Anomaly Detection from Large Traces of Operating System Events [J].
Ezeme, Mellitus ;
Azim, Akramul ;
Mahmoud, Qusay H. .
BDCAT'17: PROCEEDINGS OF THE FOURTH IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, 2017, :43-52
[8]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[9]  
Hochreiter S, 1997, NEURAL COMPUT, V9, P1735, DOI [10.1162/neco.1997.9.8.1735, 10.1007/978-3-642-24797-2, 10.1162/neco.1997.9.1.1]
[10]   Locating Software Faults Based on Minimum Debugging Frontier Set [J].
Li, Feng ;
Li, Zhiyuan ;
Huo, Wei ;
Feng, Xiaobing .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2017, 43 (08) :760-776