Detecting Cryptojacking Containers Using eBPF-Based Security Runtime and Machine Learning

被引:0
|
作者
Kim, Riyeong [1 ]
Ryu, Jeongeun [2 ]
Kim, Sumin [2 ]
Lee, Soomin [2 ]
Kim, Seongmin [1 ]
机构
[1] Sungshin Womens Univ, Dept Future Convergence Technol Engn, 2 Bomun Ro 34Da Gil, Seoul 02844, South Korea
[2] Sungshin Womens Univ, Dept Convergence Secur Engn, 2 Bomun Ro 34Da Gil, Seoul 02844, South Korea
来源
ELECTRONICS | 2025年 / 14卷 / 06期
基金
新加坡国家研究基金会;
关键词
container security; ML-based anomaly detection; cryptojacking; CRYPTOMINING MALWARE;
D O I
10.3390/electronics14061208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the use of containers has become mainstream in the cloud environment, various security threats targeting containers have also been increasing. Among them, a notable malicious activity is a cryptojacking attack that steals resources without the consent of an instance owner to mine cryptocurrency. However, detecting such anomalies in a containerized environment is more complex because containers share the host kernel, making it challenging to pinpoint resource usage and anomalies at the container granularity without introducing significant overhead. To this end, this study proposes a runtime detection framework for identifying malicious mining behaviors in the cloud-native environment. By leveraging Tetragon, a runtime security tool based on the extended Berkeley Packet Filter (eBPF), we capture system call traces and flow-level information of cryptojacking containers to extract rich feature representations for training and evaluating various machine learning models. As a result of the experiment, our framework delivers up to 99.75% classification accuracy with moderate runtime monitoring overhead.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Research Report: Enhanced eBPF Verification and eBPF-based Runtime Safety Protection
    Jin, Guang
    Li, Jason
    Briskin, Greg
    PROCEEDINGS 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, SPW 2024, 2024, : 224 - 230
  • [2] Evaluation on eBPF-based network failure prediction using AutoGluon
    Zhu, Tianhao
    Lee, Jiwon
    Du, Bojian
    Kondo, Ryoma
    Matsuura, Kentaro
    Morikawa, Hiroyuki
    Narusue, Yoshiaki
    IEICE COMMUNICATIONS EXPRESS, 2024, 13 (05): : 159 - 162
  • [3] Cryptomining makes noise: Detecting cryptojacking via Machine Learning
    Caprolu, Maurantonio
    Raponi, Simone
    Oligeri, Gabriele
    Di Pietro, Roberto
    COMPUTER COMMUNICATIONS, 2021, 171 : 126 - 139
  • [4] Website Cryptojacking Detection Using Machine Learning
    Nukala, Venkata Sai Krishna Avinash
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [5] Forensic Analysis of Cryptojacking in Host-based Docker Containers Using Honeypots
    Franco, Javier
    Acar, Abbas
    Aris, Ahmet
    Uluagac, Selcuk
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 4860 - 4865
  • [6] Android mobile security by detecting and classification of malware based on permissions using machine learning algorithms
    Varma, Ravi Kiran P.
    Raj, Kotari Prudvi
    Raju, K. V. Subba
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 294 - 299
  • [7] Detecting the Security Level of Various Cryptosystems Using Machine Learning Models
    Shafique, Arslan
    Ahmed, Jameel
    Boulila, Wadii
    Ghandorh, Hamzah
    Ahmad, Jawad
    Rehman, Mujeeb Ur
    IEEE ACCESS, 2021, 9 : 9383 - 9393
  • [8] A lightweight machine learning based security framework for detecting phishing attacks
    Kumar, Yogendra
    Subba, Basant
    2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, : 184 - 188
  • [9] Enhancing the security in cyber-world by detecting the botnets using ensemble classification based machine learning
    Srinivasan S.
    P D.
    Measurement: Sensors, 2023, 25
  • [10] Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis
    Campos, Carlos Renato Salim
    Jaafar, Fehmi
    Malik, Yasir
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 109 - 113