Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection

12/16/2022
by   James Pope, et al.
0

Security research has concentrated on converting operating system audit logs into suitable graphs, such as provenance graphs, for analysis. However, provenance graphs can grow very large requiring significant computational resources beyond what is necessary for many security tasks and are not feasible for resource constrained environments, such as edge devices. To address this problem, we present the resource-interaction graph that is built directly from the audit log. We show that the resource-interaction graph's storage requirements are significantly lower than provenance graphs using an open-source data set with two container escape attacks captured from an edge device. We use a graph autoencoder and graph clustering technique to evaluate the representation for an anomaly detection task. Both approaches are unsupervised and are thus suitable for detecting zero-day attacks. The approaches can achieve f1 scores typically over 80% and in some cases over 90% for the selected data set and attacks.

READ FULL TEXT
research
10/15/2020

Securing Manufacturing Using Blockchain

Due to the rise of Industrial Control Systems (ICSs) cyber-attacks in th...
research
01/11/2021

Anomaly Detection for Aggregated Data Using Multi-Graph Autoencoder

In data systems, activities or events are continuously collected in the ...
research
05/27/2022

Raising the Bar in Graph-level Anomaly Detection

Graph-level anomaly detection has become a critical topic in diverse are...
research
05/03/2022

ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection

As the number of heterogenous IP-connected devices and traffic volume in...
research
03/05/2022

Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning

Complex heterogeneous dynamic networks like knowledge graphs are powerfu...
research
02/12/2021

Towards AIOps in Edge Computing Environments

Edge computing was introduced as a technical enabler for the demanding r...
research
01/24/2018

A Theoretical Investigation of Graph Degree as an Unsupervised Normality Measure

For a graph representation of a dataset, a straightforward normality mea...

Please sign up or login with your details

Forgot password? Click here to reset