Behavioral Runtime Monitoring
| Stage | Description | Example |
|---|---|---|
| Event | Kernel-level signal (e.g., process or network action) | python opened /etc/shadow |
| Detection | Matches behavioral rule (policy) | Rule: Reverse Shell Spawn |
| Incident | Elevated detection needing response | Blocked connection to attacker-c2.com |
Example Runtime Feed
The Flow
Security events flow through four stages:1
Event
Jibril captures a raw system event via eBPF
2
Detection
The event matches a configured policy rule
3
Incident
The detection is logged and acted upon
Connection blocked before data transmission
4
Response
Automatic action taken + alerts sent
- Slack notification
- GitHub PR comment
- Dashboard incident
Key Metrics
TTD
Time To DetectHow quickly Garnet identifies the threatAverage: 47 seconds
TTR
Time To RespondHow quickly the threat is blockedWith auto-block: 0 seconds
Example: Cryptominer Detection
Next: Install Garnet
Deploy Garnet in your environment