SECURING SOFTWARE INSTALLATION THROUGH DEEP GRAPH LEARNING

    公开(公告)号:WO2021030133A1

    公开(公告)日:2021-02-18

    申请号:PCT/US2020/045150

    申请日:2020-08-06

    Abstract: A computer-implemented method for securing software installation through deep graph learning includes extracting (810) a new software installation graph (SIG) corresponding to a new software installation based on installation data associated with the new software installation, using (820) at least two node embedding models to generate a first vector representation by embedding the nodes of the new SIG and inferring any embeddings for out-of-vocabulary (OOV) words corresponding to unseen pathnames, utilizing (830) a deep graph autoencoder to reconstruct nodes of the new SIG from latent vector representations encoded by the graph LSTM, wherein reconstruction losses resulting from a difference of a second vector representation generated by the deep graph autoencoder and the first vector representation represent anomaly scores for each node, and performing (840) anomaly detection by comparing an overall anomaly score of the anomaly scores to a threshold of normal software installation.

    MINING AND INTEGRATING PROGRAM-LEVEL CONTEXT INFORMATION INTO LOW-LEVEL SYSTEM PROVENANCE GRAPHS

    公开(公告)号:WO2022035954A1

    公开(公告)日:2022-02-17

    申请号:PCT/US2021/045530

    申请日:2021-08-11

    Abstract: A computer- implemented method is provided for computer intrusion detection. The method includes establishing (1010) a mapping from low-level system calls to user functions in computer programs. The user functions run in a user space of an operating system. The method further includes identifying (1020), using a search algorithm inputting the mapping and a system-call trace captured at runtime, any of the user functions that trigger the low-level system calls in the system-call trace. The method further includes performing (1030), by a processor device, intrusion detection responsive to a provenance graph with program contexts. The provenance graph has nodes formed from the user functions that trigger the low-level system calls in the system-call trace. Edges in the provenance graph have edge labels describing high-level system operations for low-level system call to high-level system operation correlation- based intrusion detection.

Patent Agency Ranking