Container Anomaly Detection Using Neural Networks Analyzing System Calls

被引:5
|
作者
Gantikow, Holger [1 ]
Zoehner, Tom [1 ]
Reich, Christoph [1 ]
机构
[1] Furtwangen Univ Appl Sci, Inst Data Sci Cloud Comp & IT Secur, Furtwangen, Germany
来源
2020 28TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2020) | 2020年
关键词
Container Security; Anomaly Detection; Neural Networks;
D O I
10.1109/PDP50117.2020.00069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Container environments permeate all areas of computing, such as HPC, since they are lightweight, efficient, and ease the deployment of software. However, due to the shared host kernel, their isolation is considered to be weak, so additional protection mechanisms are needed. This paper shows that neural networks can be used to do anomaly detection by observing the behavior of containers through system call data. In more detail the detection of anomalies in file and directory paths used by system calls is evaluated to show their advantages and drawbacks.
引用
收藏
页码:408 / 412
页数:5
相关论文
共 50 条
  • [31] Anomaly Detection in In-Vehicle Networks with Graph Neural Networks
    Ozdemir, Övgü
    Karagoz, Pinar
    Schmidt, Klaus Werner
    2023 31ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU, 2023,
  • [32] Machinery Anomaly Detection using artificial neural networks and signature feature extraction
    Mayaki, Mansour Zoubeirou A.
    Riveill, Michel
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [33] Anomaly Detection Using Replicator Neural Networks Trained on Examples of One Class
    Hoang Anh Dau
    Ciesielski, Vic
    Song, Andy
    SIMULATED EVOLUTION AND LEARNING (SEAL 2014), 2014, 8886 : 311 - 322
  • [34] Web traffic anomaly detection using C-LSTM neural networks
    Kim, Tae-Young
    Cho, Sung-Bae
    EXPERT SYSTEMS WITH APPLICATIONS, 2018, 106 : 66 - 76
  • [35] A multi-layer model for anomaly intrusion detection using program sequences of system calls
    Hoang, XD
    Hu, H
    Bertok, P
    ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 531 - 536
  • [36] Neighbor discovery protocol anomaly-based detection system using neural network algorithm
    Saad, Redhwan M. A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Shaheen, Samir I.
    Hasbullah, Iznan H.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 1787 - 1803
  • [37] Generative Neural Networks for Anomaly Detection in Crowded Scenes
    Wang, Tian
    Qiao, Meina
    Lin, Zhiwei
    Li, Ce
    Snoussi, Hichem
    Liu, Zhe
    Choi, Chang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1390 - 1399
  • [38] Model fusion of deep neural networks for anomaly detection
    AlDahoul, Nouar
    Karim, Hezerul Abdul
    Wazir, Abdulaziz Saleh Ba
    JOURNAL OF BIG DATA, 2021, 8 (01)
  • [39] A Novel Anomaly Detection Approach based on Neural Networks
    Ergen, Tolga
    Kerpicci, Mine
    2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [40] A Uniform Framework for Anomaly Detection in Deep Neural Networks
    Zhao, Fangzhen
    Zhang, Chenyi
    Dong, Naipeng
    You, Zefeng
    Wu, Zhenxin
    NEURAL PROCESSING LETTERS, 2022, 54 (04) : 3467 - 3488