Process Monitoring on Sequences of System Call Count Vectors

07/12/2017
by   Michael Dymshits, et al.
0

We introduce a methodology for efficient monitoring of processes running on hosts in a corporate network. The methodology is based on collecting streams of system calls produced by all or selected processes on the hosts, and sending them over the network to a monitoring server, where machine learning algorithms are used to identify changes in process behavior due to malicious activity, hardware failures, or software errors. The methodology uses a sequence of system call count vectors as the data format which can handle large and varying volumes of data. Unlike previous approaches, the methodology introduced in this paper is suitable for distributed collection and processing of data in large corporate networks. We evaluate the methodology both in a laboratory setting on a real-life setup and provide statistics characterizing performance and accuracy of the methodology.

READ FULL TEXT

page 2

page 4

research
01/20/2020

In-The-Field Monitoring of Functional Calls: Is It Feasible?

Collecting data about the sequences of function calls executed by an app...
research
08/10/2022

A Monitoring and Discovery Approach for Declarative Processes Based on Streams

Process discovery is a family of techniques that helps to comprehend pro...
research
03/16/2020

Software-Based Monitoring and Analysis of a USB Host Controller Subject to Electrostatic Discharge

Observing, understanding, and mitigating the effects of failure in embed...
research
10/01/2019

Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream

The threat of inserting hardware Trojans during the design, production, ...
research
01/13/2023

Composite model of seismic monitoring data analysis during mining operations on the example of the Kukisvumchorrskoye deposit of JSC Apatit

Geomechanical monitoring of a rock massif is an actively developing bran...
research
03/13/2019

Lost Silence: An emergency response early detection service through continuous processing of telecommunication data streams

Early detection of significant traumatic events, e.g. a terrorist attack...

Please sign up or login with your details

Forgot password? Click here to reset