CAPTURING AND ANALYSING KERNEL EVENTS FOR ANOMALY DETECTION IN WINDOWS O.S.

dc.contributor.advisorJoshi, Anupam
dc.contributor.authorBhosale, Swapnil Mahendra
dc.contributor.departmentComputer Science and Electrical Engineering
dc.contributor.programComputer Science
dc.date.accessioned2022-09-29T15:37:46Z
dc.date.available2022-09-29T15:37:46Z
dc.date.issued2021-01-01
dc.description.abstractThis theses applies recent advances in NLP to anomaly detection in Windows OS. More specifically, we experiment using fastText as an embedding combined with an LSTM for state prediction. We explore whether we can model the normal process behavior on Windows and recognize deviations caused by malware. The actions performed by malware typically involve modifying the file system, modifying the Windows registry to change the system configuration & network actions. We developed a Windows kernel driver to capture file, registry, network events. We use fastText to train the embedding model to represent events as vectors. FastText learns not only the syntactic information but also semantic information hidden in the observed kernel events. The IP address, file path, process path, registry key etc. have syntactic structure and semantic relationships. Next, we train a sequence-based anomaly detection model using LSTM to learn the typical behavior of the Windows OS and the processes running in the system. Lastly, we propose a technique to identify measured windows event sequences as normal, or anomalies representing anattack. We evaluate the performance of this anomaly detection system to detect attacks on a system from their kernel level behavior. We collect datasets for normal (attack-free) and process takeover (attack) using the kernel driver system we develop, and use these to test our detection. We show that our approach has high accuracy, precision, and recall. We also propose to release our kernel driver to capture events as open source, to facilitate further research in this area.
dc.formatapplication:pdf
dc.genretheses
dc.identifierdoi:10.13016/m2ojd2-4zsg
dc.identifier.other12410
dc.identifier.urihttp://hdl.handle.net/11603/25963
dc.languageen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Theses and Dissertations Collection
dc.relation.ispartofUMBC Graduate School Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu
dc.sourceOriginal File Name: Bhosale_umbc_0434M_12410.pdf
dc.subjectanomaly detection
dc.subjectfastText
dc.subjectkernel driver
dc.subjectminifilter
dc.subjectwfp
dc.subjectwindows
dc.titleCAPTURING AND ANALYSING KERNEL EVENTS FOR ANOMALY DETECTION IN WINDOWS O.S.
dc.typeText
dcterms.accessRightsDistribution Rights granted to UMBC by the author.
dcterms.accessRightsAccess limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan thorugh a local library, pending author/copyright holder's permission.

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Bhosale_umbc_0434M_12410.pdf
Size:
11.03 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Bhosale-Swapnil_Open.pdf
Size:
465.38 KB
Format:
Adobe Portable Document Format
Description: