Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection

Asbat El Khairi, M. Caselli, Christian Knierim, Andreas Peter, Andrea Continella
{"title":"Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection","authors":"Asbat El Khairi, M. Caselli, Christian Knierim, Andreas Peter, Andrea Continella","doi":"10.1145/3560810.3564266","DOIUrl":null,"url":null,"abstract":"Container technology has gained ground in the industry for its scalability and lightweight virtualization, especially in cloud environments. Nevertheless, research has shown that containerized applications are an appealing target for cyberattacks, which may lead to interruption of business-critical services and financial damage. State-of-the-art anomaly-based host intrusion detection systems (HIDS) may enhance container runtime security. However, they were not designed to deal with the characteristics of containerized environments. Specifically, they cannot effectively cope with the scalability of containers and the diversity of anomalies. To address these challenges, we introduce a novel anomaly-based HIDS that relies on monitoring heterogeneous properties of system calls. Our key idea is that anomalies can be accurately detected when those properties are examined jointly within their context. To this end, we model system calls leveraging a graph-based structure that emphasizes their dependencies within their relative context, allowing us to precisely discern between normal and malicious activities. We evaluate our approach on two datasets of 20 different attack scenarios containing 11,700 normal and 1,980 attack system call traces. The achieved results show that our solution effectively detects various anomalies with reasonable runtime overhead, outperforming state-of-the-art tools.","PeriodicalId":166797,"journal":{"name":"Proceedings of the 2022 on Cloud Computing Security Workshop","volume":"173 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 on Cloud Computing Security Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3560810.3564266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Container technology has gained ground in the industry for its scalability and lightweight virtualization, especially in cloud environments. Nevertheless, research has shown that containerized applications are an appealing target for cyberattacks, which may lead to interruption of business-critical services and financial damage. State-of-the-art anomaly-based host intrusion detection systems (HIDS) may enhance container runtime security. However, they were not designed to deal with the characteristics of containerized environments. Specifically, they cannot effectively cope with the scalability of containers and the diversity of anomalies. To address these challenges, we introduce a novel anomaly-based HIDS that relies on monitoring heterogeneous properties of system calls. Our key idea is that anomalies can be accurately detected when those properties are examined jointly within their context. To this end, we model system calls leveraging a graph-based structure that emphasizes their dependencies within their relative context, allowing us to precisely discern between normal and malicious activities. We evaluate our approach on two datasets of 20 different attack scenarios containing 11,700 normal and 1,980 attack system call traces. The achieved results show that our solution effectively detects various anomalies with reasonable runtime overhead, outperforming state-of-the-art tools.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于异常的入侵检测容器中系统调用的上下文化
容器技术因其可伸缩性和轻量级虚拟化,特别是在云环境中,已经在业界获得了一席之地。然而,研究表明,容器化应用程序是网络攻击的一个诱人目标,这可能导致关键业务服务中断和财务损失。最先进的基于异常的主机入侵检测系统(HIDS)可以增强容器运行时安全性。然而,它们并不是为了处理容器化环境的特点而设计的。具体来说,它们不能有效地应对容器的可扩展性和异常的多样性。为了应对这些挑战,我们引入了一种新的基于异常的HIDS,它依赖于监控系统调用的异构属性。我们的关键思想是,当这些属性在其上下文中联合检查时,可以准确地检测到异常。为此,我们利用基于图的结构对系统调用进行建模,该结构强调它们在相对上下文中的依赖性,从而允许我们精确地辨别正常活动和恶意活动。我们在包含11,700个正常和1,980个攻击系统调用痕迹的20个不同攻击场景的两个数据集上评估了我们的方法。取得的结果表明,我们的解决方案在合理的运行时开销下有效地检测各种异常,优于最先进的工具。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Byzantine Fault Tolerance in the Age of Blockchains and Cloud Computing Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore Cryptographic Protection of Random Access Memory: How Inconspicuous can Hardening Against the most Powerful Adversaries be?
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1