Overview
Garnet uses eBPF (Extended Berkeley Packet Filter) to monitor system-level activities in real-time. This allows detection of threats at the kernel level without requiring any application changes.Detection Categories
Network-Based Detections
Crypto Mining Detection
Crypto Mining Detection
What it detects: Connections to known cryptocurrency mining poolsHow it works: Monitors outbound network connections and compares them against a database of mining pool IPs and domains.Severity: HighCommon causes:
- Compromised dependencies
- Malicious container images
- Supply chain attacks
Data Exfiltration
Data Exfiltration
What it detects: Unusual data transfers to external IPsHow it works: Monitors volume and patterns of outbound network traffic to identify suspicious data transfers.Severity: CriticalCommon causes:
- Credential theft
- Database dumps
- Secret exposure
C2 Communications
C2 Communications
What it detects: Command & Control server communicationsHow it works: Identifies connections to known malicious IPs and suspicious communication patterns.Severity: CriticalCommon causes:
- Backdoors
- Remote access trojans
- Post-exploitation frameworks
Supply Chain Attacks
Supply Chain Attacks
What it detects: Malicious code in dependencies during build/runtimeHow it works: Monitors network activity from build processes and dependency installations.Severity: HighCommon causes:
- Typosquatting
- Compromised packages
- Malicious maintainers
Process-Based Detections
Suspicious Process Execution
Suspicious Process Execution
What it detects: Unusual process spawning patternsHow it works: Monitors process creation and execution chains to identify anomalous behavior.Severity: Medium to HighCommon causes:
- Shell injection
- Privilege escalation attempts
- Lateral movement
Privilege Escalation
Privilege Escalation
What it detects: Attempts to gain elevated privilegesHow it works: Monitors syscalls and process activities related to privilege changes.Severity: CriticalCommon causes:
- Kernel exploits
- SUID/SGID abuse
- Container escape attempts
File-Based Detections
Sensitive File Access
Sensitive File Access
What it detects: Unauthorized access to sensitive filesHow it works: Monitors file system operations on critical paths like
/etc/shadow
, credentials, keys, etc.Severity: HighCommon causes:- Credential harvesting
- Configuration tampering
- Secret exposure
Malicious File Operations
Malicious File Operations
What it detects: Suspicious file creation, modification, or deletionHow it works: Tracks file operations that match known malware patterns.Severity: Medium to HighCommon causes:
- Ransomware
- Webshells
- Persistence mechanisms
Detection Metadata
Each detection includes:Field | Description |
---|---|
timestamp | When the event occurred (UTC) |
agent_id | Which agent detected the event |
severity | low, medium, high, or critical |
type | Detection category |
process | Process information (PID, name, path, args) |
network | Network details (IP, port, protocol, domain) |
file | File information (path, operation, permissions) |
container | Container context (ID, image, namespace) |
Detection States
State | Description |
---|---|
detected | Event identified but no action taken |
blocked | Event prevented from executing |
allowed | Event whitelisted by user |
investigating | Under manual review |
False Positives
Common Scenarios
-
Legitimate mining: GPU computing, SETI@home, Folding@home
- Solution: Add to allowlist via dashboard or network policy
-
Backup operations: Large data transfers to cloud storage
- Solution: Whitelist known backup destinations
-
Development tools: Package managers, build tools
- Solution: Use scope-based policies (allow in dev, block in prod)
Reducing False Positives
1
Review Detection Context
Check process ancestry, timestamps, and container context
2
Create Network Policies
Use specific scopes (workflow, repo, cluster) instead of global allowlists
3
Monitor Trends
Look for patterns in similar detections before blocking
4
Use Staging Environments
Test changes in non-production first
Custom Detection Rules
Custom detection rules are available on Enterprise plans. Contact us for more information.