it possible to easily recognize variations of existing
sequences and determine which features are respon-
sible for the divergences. However, the placement
is almost certainly not ideal to visualize syscall se-
quences in chains, i.e., to reduce the arrow lengths
between nodes. While it is possible to display the ac-
tive nodes of a SOM and their transitions as a graph
and reorder the nodes to avoid edges crossing over
or running across the plot, this would undermine the
topological node placement of the SOM.
We especially recommend our approach for sys-
tems with predictable behavior, otherwise the amount
of false positives may easily become overwhelming.
8 CONCLUSION
In this paper, we introduced an approach to visu-
alize high-dimensional syscall log lines using self-
organizing maps. Other than most existing ap-
proaches, our solution incorporates parameters as
context information, which is necessary to identify at-
tacks that do not manifest themselves as anomalous
sequences of syscall types, but rather involve unusual
combinations of parameter values. Our visualizations
involve hit histograms that show the number of input
vectors mapped to each node, as well as transitions
that display hit sequences. We used a sliding window
approach to analyze consecutively generated SOMs
and computed an anomaly score based on their pair-
wise changes. In addition, we proposed to aggregate
the syscalls within time windows and also visualized
their occurrence counts. We generated syscalls on a
real system to validate our approach. All attacks in-
jected in the system were identified as changes of the
SOMs. We therefore conclude that SOMs are suitable
to be applied for semi-automatic anomaly detection
in fixed data sets by supporting exploratory analyses
with visual cues.
ACKNOWLEDGEMENTS
This work was partly funded by the FFG projects IN-
DICAETING (868306) and DECEPT (873980), and
the EU H2020 project GUARD (833456).
REFERENCES
Abed, A. S., Clancy, T. C., and Levy, D. S. (2015). Ap-
plying bag of system calls for anomalous behavior de-
tection of applications in linux containers. In IEEE
Globecom Workshops, pages 1–5. IEEE.
Chandola, V., Banerjee, A., and Kumar, V. (2009).
Anomaly detection: A survey. ACM Computing Sur-
veys, 41(3):15.
Creech, G. and Hu, J. (2014). A semantic approach to host-
based intrusion detection systems using contiguous
and discontiguous system call patterns. IEEE Trans-
actions on Computers, 63(4):807–819.
Eskin, E., Lee, W., and Stolfo, S. (2001). Modeling sys-
tem call for intrusion detection using dynamic window
sizes. Proceedings DARPA Information Survivability
Conference and Exposition II, pages 165–175.
Forrest, S., Hofmeyr, S. A., Somayaji, A., and Longstaff,
T. A. (1996). A sense of self for unix processes. In
Proceedings of the IEEE Symposium on Security and
Privacy, pages 120–128. IEEE.
Girardin, L. and Brodbeck, D. (1998). A visual approach for
monitoring logs. In Proceedings of the 12th Systems
Administration Conference, pages 299–308.
Harris, D. M. and Harris, S. L. (2007). Chapter 3 - se-
quential logic design. In Digital Design and Com-
puter Architecture, pages 103 – 165. Morgan Kauf-
mann, Burlington.
Kavanagh, K., Bussa, T., and Sadowski, G. (2018). Magic
quadrant for security information and eventmanage-
ment. Gartner.
Kim, G., Yi, H., Lee, J., Paek, Y., and Yoon, S. (2016).
Lstm-based system-call language modeling and robust
ensemble method for designing host-based intrusion
detection systems. arXiv preprint.
Kohonen, T. (1982). Self-organized formation of topolog-
ically correct feature maps. Biological Cybernetics,
43:59–69.
Liu, A., Jiang, X., Jin, J., Mao, F., and Chen, J. (2011). En-
hancing system-called-based intrusion detection with
protocol context. pages 103–108.
Mandal, S. (2018). Operating system — introduc-
tion of system call. https://www.geeksforgeeks.org/
operating-system-introduction-system-call/. Online;
accessed: 2019-12-04.
Saxe, J., Mentis, D., and Greamo, C. (2012). Visualization
of shared system call sequence relationships in large
malware corpora. In Proceedings of the 9th Interna-
tional Symposium on Visualization for Cyber Security,
pages 33–40. ACM.
Shu, X., Yao, D., and Ramakrishnan, N. (2015). Un-
earthing stealthy program attacks buried in extremely
long execution paths. In Proceedings of the 22nd ACM
SIGSAC Conference on Computer and Communica-
tions Security, pages 401–413. ACM.
Skopik, F., Settanni, G., Fiedler, R., and Friedberg, I.
(2014). Semi-synthetic data set generation for secu-
rity software evaluation. In Proceedings of the 12th
Annual International Conference on Privacy, Security
and Trust, pages 156–163. IEEE.
Yoon, M.-K., Mohan, S., Choi, J., Christodorescu, M., and
Sha, L. (2017). Learning execution contexts from sys-
tem call distribution for anomaly detection in smart
embedded system. In Proceedings of the 2nd Interna-
tional Conference on Internet-of-Things Design and
Implementation, pages 191–196. ACM.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
360