Detecting Cryptojacking Containers Using eBPF-Based Security Runtime and Machine Learning

被引:0
|
作者
Kim, Riyeong [1 ]
Ryu, Jeongeun [2 ]
Kim, Sumin [2 ]
Lee, Soomin [2 ]
Kim, Seongmin [1 ]
机构
[1] Sungshin Womens Univ, Dept Future Convergence Technol Engn, 2 Bomun Ro 34Da Gil, Seoul 02844, South Korea
[2] Sungshin Womens Univ, Dept Convergence Secur Engn, 2 Bomun Ro 34Da Gil, Seoul 02844, South Korea
来源
ELECTRONICS | 2025年 / 14卷 / 06期
基金
新加坡国家研究基金会;
关键词
container security; ML-based anomaly detection; cryptojacking; CRYPTOMINING MALWARE;
D O I
10.3390/electronics14061208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the use of containers has become mainstream in the cloud environment, various security threats targeting containers have also been increasing. Among them, a notable malicious activity is a cryptojacking attack that steals resources without the consent of an instance owner to mine cryptocurrency. However, detecting such anomalies in a containerized environment is more complex because containers share the host kernel, making it challenging to pinpoint resource usage and anomalies at the container granularity without introducing significant overhead. To this end, this study proposes a runtime detection framework for identifying malicious mining behaviors in the cloud-native environment. By leveraging Tetragon, a runtime security tool based on the extended Berkeley Packet Filter (eBPF), we capture system call traces and flow-level information of cryptojacking containers to extract rich feature representations for training and evaluating various machine learning models. As a result of the experiment, our framework delivers up to 99.75% classification accuracy with moderate runtime monitoring overhead.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] A Method of Detecting Storage Based Network Steganography Using Machine Learning
    Cho, D. X.
    Thuong, D. T. H.
    Dung, N. K.
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY [ICICT-2019], 2019, 154 : 543 - 548
  • [22] Detecting APT Attacks Based on Network Traffic Using Machine Learning
    Xuan, Cho Do
    JOURNAL OF WEB ENGINEERING, 2021, 20 (01): : 171 - 190
  • [23] Detecting Ransomware Automated Based on Network Behavior by Using Machine Learning
    Teymourlouei, Haydar
    Harris, Vareva E.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 728 - 734
  • [24] Detecting Phishing Websites Using Machine Learning
    Alswailem, Amani
    Alabdullah, Bashayr
    Alrumayh, Norah
    Alsedrani, Aram
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [25] Detecting Phone Theft Using Machine Learning
    Liu, Xinyu
    Wagner, David
    Egelman, Serge
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEM (ICISS 2018), 2018, : 30 - 36
  • [26] Detecting A Twitter Cyberbullying Using Machine Learning
    Dalvi, Rahul Ramesh
    Chavan, Sudhanshu Baliram
    Halbe, Apama
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 297 - 301
  • [27] Detecting Phishing Domains Using Machine Learning
    Alnemari, Shouq
    Alshammari, Majid
    APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [28] Detecting Phishing Website Using Machine Learning
    Alkawaz, Mohammed Hazim
    Steven, Stephanie Joanne
    Hajamydeen, Asif Iqbal
    2020 16TH IEEE INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & ITS APPLICATIONS (CSPA 2020), 2020, : 111 - 114
  • [29] Detecting machine chatter using audio data and machine learning
    Kvinevskiy, Ilarion
    Bedi, Sanjeev
    Mann, Stephen
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2020, 108 (11-12): : 3707 - 3716
  • [30] Use of Machine Learning in Detecting Network Security of Edge Computing System
    Hou, Size
    Huang, Xin
    2019 4TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (ICBDA 2019), 2019, : 252 - 256