2015 IEEE Globecom Workshops (GC Wkshps) 2015
DOI: 10.1109/glocomw.2015.7414047
|View full text |Cite
|
Sign up to set email alerts
|

Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers

Abstract: In this paper, we present the results of using bags of system calls for learning the behavior of Linux containers for use in anomaly-detection based intrusion detection system. By using system calls of the containers monitored from the host kernel for anomaly detection, the system does not require any prior knowledge of the container nature, neither does it require altering the container or the host kernel.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 36 publications
(21 citation statements)
references
References 10 publications
0
17
0
Order By: Relevance
“…Administrative privileges are only required if the process to monitor belongs to a different user than the monitoring process. Several technologies rely on ptrace, as it is a stable and widely available interface for runtime process monitoring . During monitoring, the monitored process is halted every time it issues a syscall to the kernel.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Administrative privileges are only required if the process to monitor belongs to a different user than the monitoring process. Several technologies rely on ptrace, as it is a stable and widely available interface for runtime process monitoring . During monitoring, the monitored process is halted every time it issues a syscall to the kernel.…”
Section: Related Workmentioning
confidence: 99%
“…Several technologies rely on ptrace, as it is a stable and widely available interface for runtime process monitoring. [10][11][12][13] During monitoring, the monitored process is halted every time it issues a syscall to the kernel. The kernel redirects the request and the result of the syscall to the monitoring process before it resumes the monitored process with the syscall result.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we use live migration of cloud containers as a moving target defense (MTD) [2] mechanism against hostbased persistent attacks. The MTD mechanism is guided by a host-based intrusion detection system (HIDS) [3] [4] that monitors operating containers to detect potential anomalies or misbehaviors. The HIDS learns the behavior of all the containers running on the host, and upon detection of a change of behavior of one or more container, the HIDS signals the MTD module of the system to ESCAPE the affected container.…”
Section: Introuctionmentioning
confidence: 99%
“…if tx > thr then (8) accessed.append (1) (9) else (10) accessed.append (0) (11) end if (12) wait () (13) end while (14) return accessed (15) end procedure Algorithm 3: Flush + Flush.…”
Section: Flush + Flushmentioning
confidence: 99%
“…Some of the common techniques to monitor the guest VM in a nonintrusive way are computation metric observation [5,6], system-call observation [7][8][9], and Virtual Machine Introspection [10][11][12].…”
Section: Security and Communication Networkmentioning
confidence: 99%