
Table 4: Results of STAE Model and Baselines.
Model AttackType
Val
Precision Recall F1 AUC
GCN STAE
ALL 0.930 0.976 0.952 0.999
Privesc 0.905 1 0.950 0.998
DoS 0.957 1 0.978 0.999
GIN STAE
ALL 0.953 1 0.976 0.999
Privesc 0.950 1 0.974 0.998
DoS 0.957 1 0.978 0.999
GAT STAE
ALL 0.837 1 0.911 0.998
Privesc 0.792 1 0.884 0.996
DoS 0.880 1 0.936 0.997
Dense Baseline AE ALL 0.732 1 0.845 0.996
RNN Baseline AE ALL 0.456 1 0.626 0.971
GNN Baseline AE ALL 0.182 1 0.308 0.884
7 CONCLUSIONS
Our work addressed the problem by converting con-
tainer escape audit logs into a graph suitable for
anomaly detection. In addition to the spatial aspects,
we focus on retaining temporal information in the
logs. Our proposed STAE model uses dynamic graph
structures combined with the graph auto-encoder ar-
chitecture. Moreover, STAE model uses a novel de-
coder that passes the message through the reverse
edge direction to reconstruct the node attributes. Ex-
perimental results show that the STAE model results
in a 12% improvement in accuracy over the baseline
model and the model using the GIN operator in the
GNN-based RNN layer has the best performance.
Future work will be to evaluate the approach on
other, larger datasets. Obtaining real-world data or
implementing the extensions to simulate container es-
capes is necessary to improve further and validate the
models and methods proposed in this paper. Besides,
hyper-graphs might be an ideal data structure to rep-
resent relationships among multiple objects when rep-
resenting events in audit logs.
ACKNOWLEDGEMENTS
This work was supported, in part, by the Engineering
and Physical Sciences Research Council [grant num-
ber EP/X036871/1] and Horizon Europe [grant num-
ber HORIZON-MISS-2022-CIT-01-01].
REFERENCES
Ding, K., Li, J., Bhanushali, R., and Liu, H. (2019). Deep
anomaly detection on attributed networks. In Proceed-
ings of the 2019 SIAM International Conference on
Data Mining, pages 594–602. SIAM.
Fan, H., Zhang, F., and Li, Z. (2020). Anomalydae: Dual
autoencoder for anomaly detection on attributed net-
works. In ICASSP 2020-2020 IEEE International
Conference on Acoustics, Speech and Signal Process-
ing (ICASSP), pages 5685–5689. IEEE.
Kipf, T. N. and Welling, M. (2016). Variational graph auto-
encoders. arXiv preprint arXiv:1611.07308.
Pope, J., Liang, J., Kumar, V., Raimondo, F., Sun, X., Mc-
Conville, R., Pasquier, T., Piechocki, R., Oikonomou,
G., Luo, B., et al. (2022). Resource-interaction graph:
Efficient graph representation for anomaly detection.
arXiv preprint arXiv:2212.08525.
Pope, J., Raimondo, F., Kumar, V., McConville, R.,
Piechocki, R., Oikonomou, G., Pasquier, T., Luo, B.,
Howarth, D., Mavromatis, I., et al. (2021). Container
escape detection for edge devices. In Proceedings of
the 19th ACM Conference on Embedded Networked
Sensor Systems, pages 532–536.
Rozemberczki, B., Scherer, P., He, Y., Panagopoulos, G.,
Riedel, A., Astefanoaei, M., Kiss, O., Beres, F., ,
Lopez, G., Collignon, N., and Sarkar, R. (2021). Py-
Torch Geometric Temporal: Spatiotemporal Signal
Processing with Neural Machine Learning Models.
In Proceedings of the 30th ACM International Con-
ference on Information and Knowledge Management,
page 4564–4573.
Yang, C., Wen, H., Hooi, B., Wu, Y., and Zhou, L. (2023).
A multi-scale reconstruction method for the anomaly
detection in stochastic dynamic networks. Neurocom-
puting, 518:482–495.
Zhang, Z., Li, Y., Wang, W., Song, H., and Dong, H. (2022).
Malware detection with dynamic evolving graph con-
volutional networks. International Journal of Intelli-
gent Systems, 37(10):7261–7280.
Zheng, L., Li, Z., Li, J., Li, Z., and Gao, J. (2019). Ad-
dgraph: Anomaly detection in dynamic graph using
attention-based temporal gcn. In IJCAI, volume 3,
page 7.
Spatial-Temporal Graph Neural Network for the Detection of Container Escape Events
333