Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems 2021
DOI: 10.1145/3485730.3494114
|View full text |Cite
|
Sign up to set email alerts
|

Container Escape Detection for Edge Devices

Abstract: Edge computing is rapidly changing the IoT-Cloud landscape. Various testbeds are now able to run multiple Docker-like containers developed and deployed by end-users on edge devices. However, this capability may allow an attacker to deploy a malicious container on the host and compromise it. This paper presents a dataset based on the Linux Auditing System, which contains malicious and benign container activity. We developed two malicious scenarios, a denial of service and a privilege escalation attack, where an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…In their work, Pope et al [34] introduce a new dataset derived from the Linux Auditing System, which contains both malicious and benign examples of container activity. This dataset is the irst of its kind to focus on kernel-based container escapes and includes attacks such as denial-ofservice and privilege escalation.…”
Section: Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In their work, Pope et al [34] introduce a new dataset derived from the Linux Auditing System, which contains both malicious and benign examples of container activity. This dataset is the irst of its kind to focus on kernel-based container escapes and includes attacks such as denial-ofservice and privilege escalation.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…Lower true positive rates for certain attacks like Backdoor, SQL Injection, and Brute Force Login. [34] Annotated container-escape dataset and real-world edge device with simulated VM.…”
Section: Work Advantagementioning
confidence: 99%
“…A new dataset collected from the Linux Auditing System is presented by [16]. and includes instances of container activity that are both harmful and helpful.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, this approach also has some major disadvantages. In the case of eBPF, installation of a new forwarding program is accomplished by invoking the bpf() syscall, uses of which may be monitored by a service such as auditd [31] to check for unauthorised program installations. This could be particularly problematic for an attacker without root privileges (e.g.…”
Section: B Program Injection Considerationsmentioning
confidence: 99%