Fixed issues: - Corrected Welford's online algorithm for variance calculation - Added NaN and infinity guards to prevent invalid calculations - Added Serialize/Deserialize traits to AnomalyScore and ProcessProfile Added functionality: - Profile persistence with save_profiles() and load_profiles() - Global baseline computation from all process profiles - Profile cleanup method to remove stale profiles - Additional utility methods for profile management
203 lines
5.3 KiB
Rust
203 lines
5.3 KiB
Rust
use ghost_core::{AnomalyDetector, ProcessInfo, MemoryRegion, MemoryProtection};
|
|
use std::path::PathBuf;
|
|
|
|
#[test]
|
|
fn test_anomaly_detector_creation() {
|
|
let detector = AnomalyDetector::new();
|
|
assert!(detector.get_all_profiles().is_empty());
|
|
}
|
|
|
|
#[test]
|
|
fn test_feature_extraction() {
|
|
let detector = AnomalyDetector::new();
|
|
|
|
let process = ProcessInfo {
|
|
pid: 1234,
|
|
ppid: 1,
|
|
name: "test_process".to_string(),
|
|
path: Some("/usr/bin/test".to_string()),
|
|
thread_count: 5,
|
|
};
|
|
|
|
let regions = vec![
|
|
MemoryRegion {
|
|
base_address: 0x1000,
|
|
size: 4096,
|
|
protection: MemoryProtection::ReadExecute,
|
|
region_type: "IMAGE".to_string(),
|
|
},
|
|
MemoryRegion {
|
|
base_address: 0x2000,
|
|
size: 8192,
|
|
protection: MemoryProtection::ReadWrite,
|
|
region_type: "PRIVATE".to_string(),
|
|
},
|
|
];
|
|
|
|
let features = detector.extract_features(&process, ®ions, None);
|
|
|
|
assert_eq!(features.pid, 1234);
|
|
assert_eq!(features.memory_regions, 2);
|
|
assert_eq!(features.executable_regions, 1);
|
|
}
|
|
|
|
#[test]
|
|
fn test_anomaly_analysis() {
|
|
let mut detector = AnomalyDetector::new();
|
|
|
|
let process = ProcessInfo {
|
|
pid: 1234,
|
|
ppid: 1,
|
|
name: "test_process".to_string(),
|
|
path: Some("/usr/bin/test".to_string()),
|
|
thread_count: 5,
|
|
};
|
|
|
|
let regions = vec![
|
|
MemoryRegion {
|
|
base_address: 0x1000,
|
|
size: 4096,
|
|
protection: MemoryProtection::ReadExecute,
|
|
region_type: "IMAGE".to_string(),
|
|
},
|
|
];
|
|
|
|
let features = detector.extract_features(&process, ®ions, None);
|
|
|
|
let result = detector.analyze_anomaly(&process, &features);
|
|
assert!(result.is_ok());
|
|
|
|
let score = result.unwrap();
|
|
assert!(score.overall_score >= 0.0 && score.overall_score <= 1.0);
|
|
assert!(score.confidence >= 0.0 && score.confidence <= 1.0);
|
|
}
|
|
|
|
#[test]
|
|
fn test_profile_persistence() {
|
|
let mut detector = AnomalyDetector::new();
|
|
|
|
let process = ProcessInfo {
|
|
pid: 1234,
|
|
ppid: 1,
|
|
name: "test_process".to_string(),
|
|
path: Some("/usr/bin/test".to_string()),
|
|
thread_count: 5,
|
|
};
|
|
|
|
let regions = vec![
|
|
MemoryRegion {
|
|
base_address: 0x1000,
|
|
size: 4096,
|
|
protection: MemoryProtection::ReadExecute,
|
|
region_type: "IMAGE".to_string(),
|
|
},
|
|
];
|
|
|
|
for _ in 0..15 {
|
|
let features = detector.extract_features(&process, ®ions, None);
|
|
let _ = detector.analyze_anomaly(&process, &features);
|
|
}
|
|
|
|
let temp_path = PathBuf::from("/tmp/ghost_test_profiles.json");
|
|
|
|
let save_result = detector.save_profiles(&temp_path);
|
|
assert!(save_result.is_ok(), "Failed to save profiles: {:?}", save_result.err());
|
|
|
|
let mut detector2 = AnomalyDetector::new();
|
|
let load_result = detector2.load_profiles(&temp_path);
|
|
assert!(load_result.is_ok(), "Failed to load profiles: {:?}", load_result.err());
|
|
|
|
assert!(!detector2.get_all_profiles().is_empty());
|
|
|
|
let _ = std::fs::remove_file(temp_path);
|
|
}
|
|
|
|
#[test]
|
|
fn test_global_baseline_computation() {
|
|
let mut detector = AnomalyDetector::new();
|
|
|
|
for i in 0..3 {
|
|
let process = ProcessInfo {
|
|
pid: 1000 + i,
|
|
ppid: 1,
|
|
name: format!("process_{}", i),
|
|
path: Some(format!("/usr/bin/process_{}", i)),
|
|
thread_count: 5,
|
|
};
|
|
|
|
let regions = vec![
|
|
MemoryRegion {
|
|
base_address: 0x1000,
|
|
size: 4096,
|
|
protection: MemoryProtection::ReadExecute,
|
|
region_type: "IMAGE".to_string(),
|
|
},
|
|
];
|
|
|
|
for _ in 0..15 {
|
|
let features = detector.extract_features(&process, ®ions, None);
|
|
let _ = detector.analyze_anomaly(&process, &features);
|
|
}
|
|
}
|
|
|
|
detector.compute_global_baseline();
|
|
|
|
assert_eq!(detector.get_all_profiles().len(), 3);
|
|
}
|
|
|
|
#[test]
|
|
fn test_profile_cleanup() {
|
|
let mut detector = AnomalyDetector::new();
|
|
|
|
let process = ProcessInfo {
|
|
pid: 1234,
|
|
ppid: 1,
|
|
name: "test_process".to_string(),
|
|
path: Some("/usr/bin/test".to_string()),
|
|
thread_count: 5,
|
|
};
|
|
|
|
let regions = vec![
|
|
MemoryRegion {
|
|
base_address: 0x1000,
|
|
size: 4096,
|
|
protection: MemoryProtection::ReadExecute,
|
|
region_type: "IMAGE".to_string(),
|
|
},
|
|
];
|
|
|
|
for _ in 0..15 {
|
|
let features = detector.extract_features(&process, ®ions, None);
|
|
let _ = detector.analyze_anomaly(&process, &features);
|
|
}
|
|
|
|
assert_eq!(detector.get_all_profiles().len(), 1);
|
|
|
|
detector.cleanup_old_profiles(0);
|
|
|
|
assert_eq!(detector.get_all_profiles().len(), 0);
|
|
}
|
|
|
|
#[test]
|
|
fn test_nan_guards() {
|
|
let mut detector = AnomalyDetector::new();
|
|
|
|
let process = ProcessInfo {
|
|
pid: 1234,
|
|
ppid: 1,
|
|
name: "test_process".to_string(),
|
|
path: Some("/usr/bin/test".to_string()),
|
|
thread_count: 5,
|
|
};
|
|
|
|
let regions = vec![];
|
|
|
|
let features = detector.extract_features(&process, ®ions, None);
|
|
let result = detector.analyze_anomaly(&process, &features);
|
|
|
|
assert!(result.is_ok());
|
|
let score = result.unwrap();
|
|
assert!(score.overall_score.is_finite());
|
|
assert!(score.confidence.is_finite());
|
|
}
|