2020
DOI: 10.1504/ijcnds.2020.103857
|View full text |Cite
|
Sign up to set email alerts
|

Resilient intrusion detection system for cloud containers

Abstract: The lightweight virtualisation and isolated execution offered by Linux containers qualify it to be the dominant virtualisation platform for cloud-based applications. The fact that Linux containers run on the same host while sharing the same kernel opens the door for new attacks. However, limited research has been conducted in the area of securing cloud containers. This paper presents a resilient intrusion detection and resolution system for cloud-based containers. The system relies on two main pillars, a real-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…The method involves creating a frequency list 𝑆 = {𝑠 1 , 𝑠 2 , … , 𝑠 𝑛 where 𝑠 𝑖 is the number of times the system call during that time window is observed [18]. BoSC representation has seen frequent use in container intrusion detection literature [19,20] often paired with the Sysdig 1 tool [21,22] to directly stream system calls from running containers with a low overhead. Frequency lists are not the sole method for using system call traces in machine learning applications.…”
Section: System Callsmentioning
confidence: 99%
“…The method involves creating a frequency list 𝑆 = {𝑠 1 , 𝑠 2 , … , 𝑠 𝑛 where 𝑠 𝑖 is the number of times the system call during that time window is observed [18]. BoSC representation has seen frequent use in container intrusion detection literature [19,20] often paired with the Sysdig 1 tool [21,22] to directly stream system calls from running containers with a low overhead. Frequency lists are not the sole method for using system call traces in machine learning applications.…”
Section: System Callsmentioning
confidence: 99%