← Research

Behavioral Threat Detection

29/30 attacks detected, 0/10 false positives. Combination signatures, not weighted sums.

The v1 Problem

The first version used a weighted sum: assign each behavioral feature a threat score, add them up, trigger if the sum exceeds a threshold. It got 97% detection. It also got a 60% false positive rate.

Compiling code looks like cryptomining — sustained CPU, many threads. Video encoding looks like ransomware — high disk I/O, many file writes. Database backups look like exfiltration — large outbound data, sequential file reads. Every intensive workload shares features with some attack category. Weighted sums cannot distinguish intent from intensity.

The Fix: Combination Signatures

Each threat category defines a signature: a set of required features that must ALL be present, plus a list of confirming features where at least one must also match. A single feature never triggers alone, no matter how anomalous.

Cryptominer requires sustained CPU AND specific mining patterns AND at least one of: known pool connections, GPU compute abuse, or hashrate fingerprint. Compiling code has sustained CPU but no mining patterns — never triggers. The combination is the signature, not any individual feature.

21 signatures total. 0.7ms to evaluate all of them.

Detection Results

Attack Detection — 29/30

CategoryDetectedRate
Cryptominer3/3100%
Ransomware3/3100%
DDoS2/367%
Timebomb2/2100%
Exfiltration3/3100%
Privilege Escalation2/2100%
Lateral Movement2/2100%
Rootkit2/2100%
Keylogger1/1100%
Backdoor2/2100%
Supply Chain2/2100%
Credential Attack2/2100%
Evasion2/2100%
Integrity1/1100%

The one miss: a UDP flood DDoS variant that lacked diverse_targets. The signature requires evidence of targeting multiple destinations — a single-target UDP flood looks like a legitimate high-bandwidth stream. This is a hard edge of the rule-based approach.

False Positive Test

Benign Workloads — 0/10 false positives

WorkloadVerdict
Web browsingCLEAN
Compiling codeCLEAN
Video encodingCLEAN
Database backupCLEAN
System updateCLEAN
Docker buildCLEAN
CI pipelineCLEAN
SSH admin sessionCLEAN
Log rotationCLEAN
npm installCLEAN
Self-integrity check: PASS
Total signatures: 21
Evaluation time: 0.7ms

What It Misses

The DDoS UDP flood without diverse targets is the measured miss. But the deeper limitation is structural: rule-based combination signatures only catch attack patterns that have been defined. Unknown attack patterns — novel zero-days, new lateral movement techniques, creative exfiltration channels — need behavioral baselines, not just signatures.

This system catches known shapes fast and with zero false positives. It does not learn new shapes. That boundary is honest and permanent for this architecture.

MM10P honest limits: the 29/30 detection rate is self-referential — we designed the signatures and the test cases simultaneously. This is not independent validation. The 0/10 false positive test used 10 hand-picked normal scenarios, not real production workload traces. Five novel attack patterns (living-off-the-land, slow exfiltration, insider threat, encrypted C2 via CDN, subtle supply chain) would all evade these signatures. An attacker who knows the required features can avoid them. This demonstrates the combination-signature principle, not a validated security product. Real security tools (CrowdStrike, etc.) use ML-based anomaly detection that handles novel patterns.

Computed on Mac Mini M4, 35W.

GUMPResearch · [email protected]