Malware detection for container runtime based on virtual machine introspection

被引:0
|
作者
He, Xinfeng [1 ,2 ]
Li, Riyang [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Peoples R China
[2] Key Lab High Trusted Informat Syst Hebei Prov, Baoding 071002, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 06期
关键词
Container; Virtual machine introspection; Container escape; Convolutional neural network; Malware detection;
D O I
10.1007/s11227-023-05727-w
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The isolation technique of containers introduces uncertain security risks to malware detection in the current container environment. In this paper, we propose a framework called Malware Detection for Container Runtime based on Virtual Machine Introspection (MDCRV) to detect in-container malware. MDCRV can automatically export the memory snapshots by using virtual machine introspection in container-in-virtual-machine architecture and reconstruct container semantics from memory snapshots. Although in-container malware might escape from the isolating measures of the container, our detecting program which benefits from the isolation of the hypervisor still can work well. Additionally, we propose a container process visualization approach to improve the efficiency of analyzing the binary execution information of container runtime. We convert the live processes of in-container malware and benign application to grayscale images and employ the convolutional neural network to extract malware features from the self-constructed dataset. The experimental results show that MDCRV achieves high accuracy while improving security.
引用
收藏
页码:7245 / 7268
页数:24
相关论文
共 50 条
  • [31] Runtime-Behavior Based Malware Classification Using Online Machine Learning
    Pektas, Abdurrahman
    Acarman, Tankut
    Falcone, Ylies
    Fernandez, Jean-Claude
    2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 166 - 171
  • [32] Runtime Malware Detection using hardware features
    Sanjith, S.
    Sivaraman, E.
    Honnavalli, Prasad B.
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [33] Android Malware Detection Based on Factorization Machine
    Li, Chenglin
    Mills, Keith
    Niu, Di
    Zhu, Rui
    Zhang, Hongwen
    Kinawi, Husam
    IEEE ACCESS, 2019, 7 : 184008 - 184019
  • [34] Android Malware Detection Based on Machine Learning
    Wang, Qing-Fei
    Fang, Xiang
    2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 434 - 436
  • [35] dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
    Neugschwandtner, Matthias
    Platzer, Christian
    Comparetti, Paolo Milani
    Bayer, Ulrich
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2010, 6201 : 41 - 60
  • [36] Study of virtual machine introspection based on hardware architecture and virtualization extensions
    Zou, Bingyu
    Zhang, Huanguo
    Chen, Jingjun
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2015, 47 (01): : 54 - 59
  • [37] Agent-Based File Extraction Using Virtual Machine Introspection
    Dangl, Thomas
    Taubmann, Benjamin
    Reiser, Hans P.
    SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 174 - 191
  • [38] A Universal Semantic Bridge for Virtual Machine Introspection
    Schneider, Christian
    Pfoh, Jonas
    Eckert, Claudia
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 370 - 373
  • [39] CryptVMI: Encrypted Virtual Machine Introspection in the Cloud
    Yao, Fangzhou
    Campbell, Roy H.
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 977 - 978
  • [40] Container-Based Cloud Virtual Machine Benchmarking
    Varghese, Blesson
    Subba, Lawan Thamsuhang
    Thai, Long
    Barker, Adam
    PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2016, : 192 - 201