I See Syscalls by the Seashore: An Anomaly-based IDS for Containers Leveraging Sysdig Data

被引:0
作者
Frasao, Anderson [1 ]
Heinrich, Tiago [2 ]
Fulber-Garcia, Vinicius [1 ]
Will, Newton C. [3 ]
Obelheiro, Rafael R. [4 ]
Maziero, Carlos A. [1 ]
机构
[1] Univ Fed Parana, Informat Dept, Curitiba, Parana, Brazil
[2] Max Planck Inst Informat, Saarbrucken, Germany
[3] Univ Tecnol Fed Parana, Comp Sci Dept, Dois Vizinhos, Brazil
[4] Univ Estado Santa Catarina, Comp Sci Dept, Joinville, Brazil
来源
2024 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, ISCC 2024 | 2024年
关键词
Intrusion Detection; Anomaly Detection; Security; INTRUSION DETECTION; SYSTEM;
D O I
10.1109/ISCC61673.2024.10733595
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection in virtualized environments is vital due to the widespread adoption of virtualization technology. A common strategy for achieving this task involves collecting data from the virtual environment and providing it to intrusion detection solutions. However, these solutions can be affected by other elements present in the virtual environment. An approach that has gained prominence is applying machine learning (ML) models to perform anomaly-based intrusion detection based on system call traces. In Linux-based environments, many tools can be used for collecting the system calls issued by processes and containers; two of the most popular are strace and sysdig. This paper introduces a dataset of system call traces collected with sysdig with a focus on anomaly-based intrusion detection for containerized applications and uses this dataset to compare the effectiveness of strace and sysdig data and evaluate the performance of five different ML models for anomaly detection. The results reveal that sysdig is an attractive option, enabling the collection of system call traces with lower overhead than strace while achieving good detection performance with several ML models.
引用
收藏
页数:6
相关论文
共 35 条
  • [1] Resilient intrusion detection system for cloud containers
    Abed, Amr S.
    Azab, Mohamed
    Clancy, Charles
    Kashkoush, Mona S.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 24 (01) : 1 - 22
  • [2] Abed AS, 2015, IEEE GLOBE WORK
  • [3] Abourezq M, 2016, INT J ADV COMPUT SC, V7, P157
  • [4] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [5] [Anonymous], [43] 14:00-17:00, "ISO 10993-1:2018," ISO. Accessed: Apr. 18, 2024. [Online]. Available: https://www.iso.org/standard/68936.html
  • [6] [Anonymous], 2024, ptrace(2)-Linux manual page
  • [7] Armando A, 2013, IFIP ADV INF COMM TE, V405, P176
  • [8] Bernaschi M., 2002, ACM Transactions on Information and Systems Security, V5, P36, DOI 10.1145/504909.504911
  • [9] Taking a Peek: An Evaluation of Anomaly Detection Using System calls for Containers
    Castanhel, Gabriel R.
    Heinrich, Tiago
    Ceschin, Fabricio
    Maziero, Carlos
    [J]. 26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [10] Ceschin F, 2023, Arxiv, DOI arXiv:2010.16045