Detecting Cryptojacking Containers Using eBPF-Based Security Runtime and Machine Learning

被引:0
|
作者
Kim, Riyeong [1 ]
Ryu, Jeongeun [2 ]
Kim, Sumin [2 ]
Lee, Soomin [2 ]
Kim, Seongmin [1 ]
机构
[1] Sungshin Womens Univ, Dept Future Convergence Technol Engn, 2 Bomun Ro 34Da Gil, Seoul 02844, South Korea
[2] Sungshin Womens Univ, Dept Convergence Secur Engn, 2 Bomun Ro 34Da Gil, Seoul 02844, South Korea
来源
ELECTRONICS | 2025年 / 14卷 / 06期
基金
新加坡国家研究基金会;
关键词
container security; ML-based anomaly detection; cryptojacking; CRYPTOMINING MALWARE;
D O I
10.3390/electronics14061208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the use of containers has become mainstream in the cloud environment, various security threats targeting containers have also been increasing. Among them, a notable malicious activity is a cryptojacking attack that steals resources without the consent of an instance owner to mine cryptocurrency. However, detecting such anomalies in a containerized environment is more complex because containers share the host kernel, making it challenging to pinpoint resource usage and anomalies at the container granularity without introducing significant overhead. To this end, this study proposes a runtime detection framework for identifying malicious mining behaviors in the cloud-native environment. By leveraging Tetragon, a runtime security tool based on the extended Berkeley Packet Filter (eBPF), we capture system call traces and flow-level information of cryptojacking containers to extract rich feature representations for training and evaluating various machine learning models. As a result of the experiment, our framework delivers up to 99.75% classification accuracy with moderate runtime monitoring overhead.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Modeling Application Performance in Docker Containers using Machine Learning Techniques
    Ye, Kejiang
    Kou, Yanmin
    Lu, Chengzhi
    Wang, Yang
    Xu, Cheng-Zhong
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 1057 - 1062
  • [42] Machine Learning Based Security for Smart Cities
    Amaizu, Gabriel Chukwunonso
    Lee, Jae-Min
    Kim, Dong-Seong
    2022 27TH ASIA PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2022): CREATING INNOVATIVE COMMUNICATION TECHNOLOGIES FOR POST-PANDEMIC ERA, 2022, : 572 - 573
  • [43] Machine Learning-based Orchestration of Containers: A Taxonomy and Future Directions
    Zhong, Zhiheng
    Xu, Minxian
    Rodriguez, Maria Alejandra
    Xu, Chengzhong
    Buyya, Rajkumar
    ACM COMPUTING SURVEYS, 2022, 54 (10S)
  • [44] Machine learning techniques based on security management in smart cities using robots
    Zhang, Mengqi
    Wang, Xi
    Sathishkumar, V. E.
    Sivakumar, V
    WORK-A JOURNAL OF PREVENTION ASSESSMENT & REHABILITATION, 2021, 68 (03): : 891 - 902
  • [45] Detecting communication protocol security flaws by formal fuzz testing and machine learning
    Shu, Guoqiang
    Hsu, Yating
    Lee, David
    FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2008, 2008, 5048 : 299 - 304
  • [46] Android-based Smartphone Malware Exploit Prevention Using a Machine Learning-based Runtime Detection System
    Vijay, Athul
    Portillo-Dominguez, A. Omar
    Ayala-Rivera, Vanessa
    2022 10TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION, CONISOFT, 2022, : 131 - 139
  • [47] Detecting BGP Anomalies Using Machine Learning Techniques
    Ding, Qingye
    Li, Zhida
    Batta, Prerna
    Trajkovic, Ljiljana
    2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 3352 - 3355
  • [48] Detecting Textual Propaganda Using Machine Learning Techniques
    Khanday, Akib Mohi Ud Din
    Khan, Qamar Rayees
    Rabani, Syed Tanzeel
    BAGHDAD SCIENCE JOURNAL, 2021, 18 (01) : 199 - 209
  • [49] Detecting Suspicious Texts Using Machine Learning Techniques
    Sharif, Omar
    Hoque, Mohammed Moshiul
    Kayes, A. S. M.
    Nowrozy, Raza
    Sarker, Iqbal H.
    APPLIED SCIENCES-BASEL, 2020, 10 (18):
  • [50] Detecting Arabic Fake News Using Machine Learning
    Khalil, Ashwaq
    Jarrah, Moath
    Aldwairi, Monther
    Jararweh, Yaser
    2021 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT DATA SCIENCE TECHNOLOGIES AND APPLICATIONS (IDSTA), 2021, : 171 - 177