Skip to content

GitHub-MasterX/Artifact_2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Artifact 2 – Process Behavior Profiling using System Call Telemetry

Overview

Building on ARTIFACT 1 we are going to analyze the deviations in the syscall sequences under different behavioral scenrios such as privilege commands and the commands used for environment probing are used and compare them with normal execution, to to quantify the deviations using mismatch and coverage metrics

By tracing syscall execution and transforming them into structured datasets, this artifact tries to identify patterns that characterize normal system activity and potentially anomalous behavior.

The syscalls collected for this artifact are mainly focussed on scenarios designed to simulate privilege-impacting and exploratory behaviors covering both single-command and multi-command execution modes

Behavior is analyzed using sliding window-based syscall sequence comparison. Sequences are evaluated using mismatch and coverage metrics relative to baseline behavior


Objectives

  • Capture syscall traces under predefined behavioral scenarios (normal, recon, priv)
  • Extract structured telemetry from raw syscall logs.
  • Compare them against baseline syscall traces from normal execution
  • Identify syscall distribution differences between normal and modified program behavior(priv and recon scenarios under single-command and multiple-command execution modes).
  • Visualize behavioral differences through graphical analysis.

Experimental Setup

Environment

  • Linux (Ubuntu)
  • Python 3
  • strace syscall tracing tool

Tools Used

  • strace – intercepts system calls made by running processes.
  • Python scripts – parse syscall logs and generate structured datasets.
  • Matplotlib – used for visualizing syscall behavior.

Data Collection

System calls were collected by executing programs under the strace monitoring environment:

strace -o trace.log

Each trace contains detailed telemetry including:

  • syscall name
  • timestamp
  • return values
  • arguments

These traces represent low-level behavioral telemetry generated by program execution.


Data Processing Pipeline

Raw syscall logs were processed through the following pipeline:

  1. Collect raw syscall traces.
  2. Parse syscall entries using Python scripts.
  3. Extract relevant behavioral attributes.
  4. Convert extracted data into CSV format.
  5. Generate behavioral datasets for visualization.

Behavioral Analysis

The collected telemetry was analyzed to observe:

  • syscall frequency distribution
  • behavioral variations between processes
  • differences in system resource interaction patterns

This analysis helps reveal how program behavior can be represented through syscall telemetry patterns.

These observations are derived from sequence-level comparisons using sliding window-based mismatch and coverage metrics


Visualization

Behavioral patterns were visualized using two plots:

Coverage Plot - proportion of sequences matching baseline behavior

Mismatch Plot - highlights deviations between expected and observed behavior patterns. These visualizations provide an interpretable view of behavioral differences in system execution.


Key Observations

  • System call telemetry provides a consistent behavioral fingerprint of running processes.
  • Behavioral patterns vary depending on program execution context.
  • Structured telemetry analysis can reveal subtle differences in process behavior.

Reproducibility

To reproduce this experiment:

  1. Run the target program under "strace".
  2. Parse syscall logs using the provided Python scripts.
  3. Generate structured datasets.
  4. Produce behavioral plots.

Security Relevance

The derived behavioral interpretation:-

  • High priv + low recon -> may indicate stronger anomalous behavior
  • Low priv + low recon -> may indicate beingn or low-signal behavior
  • High priv + high recon -> may indicate controlled or expected privileged behavior

About

This artifact studies how reconnaissance and privilege-escalation manifest at the system-call level on Linux systems

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages