Fix anomaly detection issues and add missing functionality
Fixed issues: - Corrected Welford's online algorithm for variance calculation - Added NaN and infinity guards to prevent invalid calculations - Added Serialize/Deserialize traits to AnomalyScore and ProcessProfile Added functionality: - Profile persistence with save_profiles() and load_profiles() - Global baseline computation from all process profiles - Profile cleanup method to remove stale profiles - Additional utility methods for profile management
This commit is contained in:
202
ghost-core/tests/anomaly_test.rs
Normal file
202
ghost-core/tests/anomaly_test.rs
Normal file
@@ -0,0 +1,202 @@
|
||||
use ghost_core::{AnomalyDetector, ProcessInfo, MemoryRegion, MemoryProtection};
|
||||
use std::path::PathBuf;
|
||||
|
||||
#[test]
|
||||
fn test_anomaly_detector_creation() {
|
||||
let detector = AnomalyDetector::new();
|
||||
assert!(detector.get_all_profiles().is_empty());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_feature_extraction() {
|
||||
let detector = AnomalyDetector::new();
|
||||
|
||||
let process = ProcessInfo {
|
||||
pid: 1234,
|
||||
ppid: 1,
|
||||
name: "test_process".to_string(),
|
||||
path: Some("/usr/bin/test".to_string()),
|
||||
thread_count: 5,
|
||||
};
|
||||
|
||||
let regions = vec![
|
||||
MemoryRegion {
|
||||
base_address: 0x1000,
|
||||
size: 4096,
|
||||
protection: MemoryProtection::ReadExecute,
|
||||
region_type: "IMAGE".to_string(),
|
||||
},
|
||||
MemoryRegion {
|
||||
base_address: 0x2000,
|
||||
size: 8192,
|
||||
protection: MemoryProtection::ReadWrite,
|
||||
region_type: "PRIVATE".to_string(),
|
||||
},
|
||||
];
|
||||
|
||||
let features = detector.extract_features(&process, ®ions, None);
|
||||
|
||||
assert_eq!(features.pid, 1234);
|
||||
assert_eq!(features.memory_regions, 2);
|
||||
assert_eq!(features.executable_regions, 1);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_anomaly_analysis() {
|
||||
let mut detector = AnomalyDetector::new();
|
||||
|
||||
let process = ProcessInfo {
|
||||
pid: 1234,
|
||||
ppid: 1,
|
||||
name: "test_process".to_string(),
|
||||
path: Some("/usr/bin/test".to_string()),
|
||||
thread_count: 5,
|
||||
};
|
||||
|
||||
let regions = vec![
|
||||
MemoryRegion {
|
||||
base_address: 0x1000,
|
||||
size: 4096,
|
||||
protection: MemoryProtection::ReadExecute,
|
||||
region_type: "IMAGE".to_string(),
|
||||
},
|
||||
];
|
||||
|
||||
let features = detector.extract_features(&process, ®ions, None);
|
||||
|
||||
let result = detector.analyze_anomaly(&process, &features);
|
||||
assert!(result.is_ok());
|
||||
|
||||
let score = result.unwrap();
|
||||
assert!(score.overall_score >= 0.0 && score.overall_score <= 1.0);
|
||||
assert!(score.confidence >= 0.0 && score.confidence <= 1.0);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_profile_persistence() {
|
||||
let mut detector = AnomalyDetector::new();
|
||||
|
||||
let process = ProcessInfo {
|
||||
pid: 1234,
|
||||
ppid: 1,
|
||||
name: "test_process".to_string(),
|
||||
path: Some("/usr/bin/test".to_string()),
|
||||
thread_count: 5,
|
||||
};
|
||||
|
||||
let regions = vec![
|
||||
MemoryRegion {
|
||||
base_address: 0x1000,
|
||||
size: 4096,
|
||||
protection: MemoryProtection::ReadExecute,
|
||||
region_type: "IMAGE".to_string(),
|
||||
},
|
||||
];
|
||||
|
||||
for _ in 0..15 {
|
||||
let features = detector.extract_features(&process, ®ions, None);
|
||||
let _ = detector.analyze_anomaly(&process, &features);
|
||||
}
|
||||
|
||||
let temp_path = PathBuf::from("/tmp/ghost_test_profiles.json");
|
||||
|
||||
let save_result = detector.save_profiles(&temp_path);
|
||||
assert!(save_result.is_ok(), "Failed to save profiles: {:?}", save_result.err());
|
||||
|
||||
let mut detector2 = AnomalyDetector::new();
|
||||
let load_result = detector2.load_profiles(&temp_path);
|
||||
assert!(load_result.is_ok(), "Failed to load profiles: {:?}", load_result.err());
|
||||
|
||||
assert!(!detector2.get_all_profiles().is_empty());
|
||||
|
||||
let _ = std::fs::remove_file(temp_path);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_global_baseline_computation() {
|
||||
let mut detector = AnomalyDetector::new();
|
||||
|
||||
for i in 0..3 {
|
||||
let process = ProcessInfo {
|
||||
pid: 1000 + i,
|
||||
ppid: 1,
|
||||
name: format!("process_{}", i),
|
||||
path: Some(format!("/usr/bin/process_{}", i)),
|
||||
thread_count: 5,
|
||||
};
|
||||
|
||||
let regions = vec![
|
||||
MemoryRegion {
|
||||
base_address: 0x1000,
|
||||
size: 4096,
|
||||
protection: MemoryProtection::ReadExecute,
|
||||
region_type: "IMAGE".to_string(),
|
||||
},
|
||||
];
|
||||
|
||||
for _ in 0..15 {
|
||||
let features = detector.extract_features(&process, ®ions, None);
|
||||
let _ = detector.analyze_anomaly(&process, &features);
|
||||
}
|
||||
}
|
||||
|
||||
detector.compute_global_baseline();
|
||||
|
||||
assert_eq!(detector.get_all_profiles().len(), 3);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_profile_cleanup() {
|
||||
let mut detector = AnomalyDetector::new();
|
||||
|
||||
let process = ProcessInfo {
|
||||
pid: 1234,
|
||||
ppid: 1,
|
||||
name: "test_process".to_string(),
|
||||
path: Some("/usr/bin/test".to_string()),
|
||||
thread_count: 5,
|
||||
};
|
||||
|
||||
let regions = vec![
|
||||
MemoryRegion {
|
||||
base_address: 0x1000,
|
||||
size: 4096,
|
||||
protection: MemoryProtection::ReadExecute,
|
||||
region_type: "IMAGE".to_string(),
|
||||
},
|
||||
];
|
||||
|
||||
for _ in 0..15 {
|
||||
let features = detector.extract_features(&process, ®ions, None);
|
||||
let _ = detector.analyze_anomaly(&process, &features);
|
||||
}
|
||||
|
||||
assert_eq!(detector.get_all_profiles().len(), 1);
|
||||
|
||||
detector.cleanup_old_profiles(0);
|
||||
|
||||
assert_eq!(detector.get_all_profiles().len(), 0);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_nan_guards() {
|
||||
let mut detector = AnomalyDetector::new();
|
||||
|
||||
let process = ProcessInfo {
|
||||
pid: 1234,
|
||||
ppid: 1,
|
||||
name: "test_process".to_string(),
|
||||
path: Some("/usr/bin/test".to_string()),
|
||||
thread_count: 5,
|
||||
};
|
||||
|
||||
let regions = vec![];
|
||||
|
||||
let features = detector.extract_features(&process, ®ions, None);
|
||||
let result = detector.analyze_anomaly(&process, &features);
|
||||
|
||||
assert!(result.is_ok());
|
||||
let score = result.unwrap();
|
||||
assert!(score.overall_score.is_finite());
|
||||
assert!(score.confidence.is_finite());
|
||||
}
|
||||
Reference in New Issue
Block a user