PESKEA: Anomaly Detection Framework for Profiling Kernel Event Attributes in Embedded Systems

被引:1
作者
Ezeme, Okwudili M. [1 ]
Azim, Akramul [1 ]
Mahmoud, Qusay H. [1 ]
机构
[1] Ontario Tech Univ, Dept Elect Comp & Software Engn, Oshawa, ON L1H 7K4, Canada
关键词
Anomaly detection; Embedded systems; Feature extraction; Monitoring; Kernel; Hardware; Context modeling; anomaly detection framework; embedded operating system; machine learning;
D O I
10.1109/TETC.2020.2971251
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the software development life cycle, we use the execution traces of a given application to examine the behavior of the software when an error occurs or to monitor the software performance and compliance. However, this type of application trace analysis focuses on checking the performance of the software against its design goals. Conversely, the operating system (OS) sits between the application and the hardware, and traces logged from this layer capture the behavior of the embedded system and not just the application. Hence, an analysis of the kernel events captures the system-wide performance of the embedded system. Consequently, we present a feature-based anomaly detection framework called PESKEA, which exploits the statistical variance of the features in the execution traces of an embedded OS to perform trace classification, and subsequently, anomaly detection. We test PESKEA with two public datasets we refer to as Dataset I and Dataset II. On Dataset I, PESKEA results show a 3 to 6 percent improvement in the true positive rate (TPR) of Dataset I compared to the previous work tested on this dataset, and scores between 88.37 to 100 percent in Dataset II. We hope to test PESKEA on non-UAV embedded control application datasets in future work.
引用
收藏
页码:957 / 971
页数:15
相关论文
共 25 条
[1]  
[Anonymous], 2009, P 17 INT C REAL TIM
[2]   Anomaly Detection for Discrete Sequences: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (05) :823-839
[3]   RETracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps [J].
Cui, Weidong ;
Peinado, Marcus ;
Cha, Sang Kil ;
Fratantonio, Yanick ;
Kemerlis, Vasileios P. .
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, :820-831
[4]   Feature location in source code: a taxonomy and survey [J].
Dit, Bogdan ;
Revelle, Meghan ;
Gethers, Malcom ;
Poshyvanyk, Denys .
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2013, 25 (01) :53-95
[5]   An Imputation-based Augmented Anomaly Detection from Large Traces of Operating System Events [J].
Ezeme, Mellitus ;
Azim, Akramul ;
Mahmoud, Qusay H. .
BDCAT'17: PROCEEDINGS OF THE FOURTH IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, 2017, :43-52
[6]  
Ezeme O. M., 2019, DATASET CONTEXT MODE, DOI [10.17632/vfvw7g8s8h.2, DOI 10.17632/VFVW7G8S8H.2]
[7]   DeepAnom: An Ensemble Deep Framework for Anomaly Detection in System Processes [J].
Ezeme, Okwudili M. ;
Lescisin, Michael ;
Mahmoud, Qusay H. ;
Azim, Akramul .
ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, 11489 :549-555
[8]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[9]   Optimal implementations of UPGMA and other common clustering algorithms [J].
Gronau, Ilan ;
Moran, Shlomo .
INFORMATION PROCESSING LETTERS, 2007, 104 (06) :205-210
[10]  
Hofmeyr S. A., 1998, Journal of Computer Security, V6, P151