Skip to content

Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders

License

Notifications You must be signed in to change notification settings

evilsocket/ebpf-process-anomaly-detection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Process behaviour anomaly detection using eBPF system call tracing and unsupervised learning Autoencoders.

Read this blog post for a complete description of the project.

Installation

sudo pip3 install -r requirements.txt

Learning

During the first step, we need to sample as much data as possible from a running target process (pid 1234 in this example):

sudo ./main.py --pid 1234 --data activity.csv --learn

Keep the sampling going while you trigger normal behaviour in the target process, this will generate the activity.csv file for training.

Training a model

We'll now train a model to detect anomalies:

./main.py --data activity.csv --model model.h5 --train

The autoencoder saved to model.h5 can now be used for anomaly detection with the error threshold print at the end of the training.

Anomaly detection

Once the model has been trained it can be used on the target process to detect anomalies, in this case we're using a 10.0 error threshold:

sudo ./main.py --pid 1234 --model model.h5 --max-error 10.0 --run

When an anomaly is detected the cumulative error will be printed along wiht the top 3 anomalous system calls:

error = 30.605255 - max = 10.000000 - top 3:
  b'getpriority' = 0.994272
  b'writev' = 0.987554
  b'creat' = 0.969955

License

This project is made with ♥ by @evilsocket and it is released under the GPL3 license.

About

Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages