Detecting Cryptojacking Containers Using eBPF-Based Security Runtime and Machine Learning

被引:0
|
作者
Kim, Riyeong [1 ]
Ryu, Jeongeun [2 ]
Kim, Sumin [2 ]
Lee, Soomin [2 ]
Kim, Seongmin [1 ]
机构
[1] Sungshin Womens Univ, Dept Future Convergence Technol Engn, 2 Bomun Ro 34Da Gil, Seoul 02844, South Korea
[2] Sungshin Womens Univ, Dept Convergence Secur Engn, 2 Bomun Ro 34Da Gil, Seoul 02844, South Korea
来源
ELECTRONICS | 2025年 / 14卷 / 06期
基金
新加坡国家研究基金会;
关键词
container security; ML-based anomaly detection; cryptojacking; CRYPTOMINING MALWARE;
D O I
10.3390/electronics14061208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the use of containers has become mainstream in the cloud environment, various security threats targeting containers have also been increasing. Among them, a notable malicious activity is a cryptojacking attack that steals resources without the consent of an instance owner to mine cryptocurrency. However, detecting such anomalies in a containerized environment is more complex because containers share the host kernel, making it challenging to pinpoint resource usage and anomalies at the container granularity without introducing significant overhead. To this end, this study proposes a runtime detection framework for identifying malicious mining behaviors in the cloud-native environment. By leveraging Tetragon, a runtime security tool based on the extended Berkeley Packet Filter (eBPF), we capture system call traces and flow-level information of cryptojacking containers to extract rich feature representations for training and evaluating various machine learning models. As a result of the experiment, our framework delivers up to 99.75% classification accuracy with moderate runtime monitoring overhead.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] Detecting machine chatter using audio data and machine learning
    Ilarion Kvinevskiy
    Sanjeev Bedi
    Stephen Mann
    The International Journal of Advanced Manufacturing Technology, 2020, 108 : 3707 - 3716
  • [32] Adaptive OpenMP Task Scheduling Using Runtime APIs and Machine Learning
    Qawasmeh, Ahmad R.
    Malik, Abid M.
    Chapman, Barbara M.
    2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 889 - 895
  • [33] Automatic Tuning of MPI Runtime Parameter Settings by Using Machine Learning
    Pellegrini, Simone
    Fahringer, Thomas
    Jordan, Herbert
    Moritsch, Hans
    PROCEEDINGS OF THE 2010 COMPUTING FRONTIERS CONFERENCE (CF 2010), 2010, : 115 - 116
  • [34] Enhancing the security of patients' portals and websites by detecting malicious web crawlers using machine learning techniques
    Hosseini, Nafiseh
    Fakhar, Fatemeh
    Kiani, Behzad
    Eslami, Saeid
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2019, 132
  • [35] An IoT-based Framework for Detecting Heart Conditions using Machine Learning
    Alnaggar, Mona
    Handosa, Mohamed
    Medhat, T.
    Rashad, M. Z.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (04) : 379 - 389
  • [36] Detecting Trojan horses based on system behavior using machine learning method
    Liu, Yu-Feng
    Zhang, Li-Wei
    Liang, Jian
    Qu, Sheng
    Ni, Zhi-Qiang
    2010 International Conference on Machine Learning and Cybernetics, ICMLC 2010, 2010, 2 : 855 - 860
  • [37] Automated Performance Modeling Based on Runtime Feature Detection and Machine Learning
    Sun, Jingwei
    Zhan, Shiyan
    Sun, Guagnzhong
    Chen, Yong
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 744 - 751
  • [38] Recovering Performance for Vector-based Machine Learning on Managed Runtime
    Wu, Mingyu
    Guan, Haibing
    Zang, Binyu
    Chen, Haibo
    ACM SIGPLAN NOTICES, 2017, 52 (08) : 457 - 458
  • [39] Enchanced CAV Security Using Machine Learning
    Patel, Anish
    Bhavsar, Mansi
    Roy, Kaushik
    2024 7TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, BIG DATA, COMPUTING AND DATA COMMUNICATION SYSTEMS, ICABCD 2024, 2024,
  • [40] Security of Internet Of Things Using Machine Learning
    Baja, Youssra
    Chougdali, Khalid
    2022 9TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS, WINCOM, 2022, : 30 - 35