Security Model
Behavioral Data Integrity
Detection Recipe Confidentiality
Jibril's monitoring system maintains its core detection logic as a secret, even though it provides public detection guidelines. This secrecy hinders attackers from deciphering its detection patterns, thereby minimizing their evasion opportunities.
Rate-Limiting
Jibril utilizes sophisticated internal mechanisms to limit repetitive events, significantly reducing noise and false positives. Moreover, Jibril integrates with advanced AI models, enabling it to block or accurately classify incorrect detections. This dual approach ensures that false positives are quickly and effectively identified, enhancing the system's accuracy and reliability.
Kernel/Userland Separation
Secure Memory Access
eBPF (extended Berkeley Packet Filter) programs execute safely in the kernel after passing a stringent validation by the Linux kernel verifier. This verifier checks the programs to ensure compliance with memory usage rules, preventing unauthorized memory access. This process enforces security policies, maintains isolation between kernel and user-space memory, and bolsters system integrity.
Userland Optimization
Userland code ensures isolation by executing each process in a separate, controlled environment. Detection recipes operate independently, utilizing distinct logic pathways to avoid interference with other processes. Reactions are executed within their own JavaScript VM contexts, further safeguarding the system by encapsulating execution environments.
Access Control and Monitoring
Privilege Protection
To load or inspect Jibril's kernel programs, root user access is essential, accompanied by specific permissions such as CAP_BPF or CAP_SYS_ADMIN. These permissions are strictly required to ensure system integrity and security. Any attempt to bypass or manipulate these restrictions is immediately detected and flagged as potential tampering.
Userland Privilege Management
Jibril follows least-privilege principles, dropping unnecessary capabilities after eBPF initialization to prevent privilege exploitation.
System Resilience
Tamper Detection
Any writes to eBPF maps that have not been verified are detected as tampering events. Similarly, unauthorized or rogue eBPF loads are identified and marked for further investigation. This ensures that the system maintains its integrity by preventing potential malicious activities from unverified executions.
Plugin Isolation
In Jibril, each extension and plugin operates in its own dedicated set of threads. This strategy ensures enhanced reliability and robustness across the entire monitoring system. By isolating each component in individual threads, the system can protect itself against failures that might arise within any single extension or plugin. As a result, if a particular component encounters issues or fails, it will not compromise or disrupt the overall functioning of the monitoring system.
Compliance Alignment
GDPR-Focused
Jibril tracks only metadata (filenames, PIDs, timestamps)—not content—minimizing personal data processing risks. Future updates will implement anonymization for enhanced compliance requirements.
ISO 27001 Ready
Robust logging, granular access controls, and tamper alerting facilitate compliance with ISO 27001 security framework requirements.
Last updated