A Framework for Anomaly Detection in Time-Driven and Event-Driven Processes Using Kernel Traces

被引:9
作者
Ezeme, Okwudili M. [1 ]
Mahmoud, Qusay [1 ]
Azim, Akramul [1 ]
机构
[1] Ontario Tech Univ, Dept Elect Comp & Software Engn, Oshawa, ON L1G 0C5, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Context modeling; unsupervised learning; anomaly detection; kernel events;
D O I
10.1109/TKDE.2020.2978469
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Model-checking and verification using Kripke structures and computational tree logic* (CTL*) use abstractions from the model/process/application to create the state-transition graphs that verify the model behavior. This scheme of profiling the performance of a process imports that the depth of the process operation correlates with the level abstraction. However, because of state explosion problems, these abstractions tend to restrict the scope to create manageable execution states. Therefore, for context modeling, this procedure does not generate a fine-grained behavioral model as generated states limit the ability of the abstraction to capture the execution time interactions amongst the processes, the hardware, and the kernel. Hence, in this paper, we present an end-to-end framework that comprises auto-encoders and probabilistic models to understand the behavior of system processes and detect deviant behaviors. We test this framework with a publicly available dataset generated from an autonomous aerial vehicle (UAV) application and the results show that by creating a fine-grained model that exploits previously unharnessed properties of the system calls, we can create a dynamic anomaly detection framework that evolves as the threats change.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 30 条
[1]  
Aldawud O., 2003, P 3 INT WORKSH ASP O
[2]  
[Anonymous], 2005, P 5 ACM SIGCOMM C IN
[3]  
Balasch J., 2011, 2011 WORKSH FAULT DI, P105, DOI DOI 10.1109/FDTC.2011.9
[4]  
Bell R., 2006, P 10 AUSTR WORKSH SA, V55, P3
[5]  
Biere A, 1999, LECT NOTES COMPUT SC, V1579, P193
[6]   Anomaly Detection for Discrete Sequences: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (05) :823-839
[7]  
Chollet F, 2015, KERAS
[8]  
Clarke E. M., 2012, TOOLS PRACTICAL SOFT, V7682, DOI [10.1007/978-3-642-35746-6_1, DOI 10.1007/978-3-642-35746-6_1]
[9]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[10]   An Imputation-based Augmented Anomaly Detection from Large Traces of Operating System Events [J].
Ezeme, Mellitus ;
Azim, Akramul ;
Mahmoud, Qusay H. .
BDCAT'17: PROCEEDINGS OF THE FOURTH IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, 2017, :43-52