2019
DOI: 10.1007/978-981-13-5826-5_26
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Real-Time Intrusion Detection System for Docker Containers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…Another solution involves the integration of syscalls with explainable machine learning algorithms, offering a new perspective on how to interpret container anomalies [28]. Yet another approach uses n-grams of syscalls to identify anomalies based on their occurrence probabilities [48]. Contrary to these baselinebased approaches that demand periodic retraining to adapt to normality shifts, our approach effectively detects anomalies by comparing the patterns of replicas while accommodating drifts without the need for retraining.…”
Section: Ixrelated Workmentioning
confidence: 99%
“…Another solution involves the integration of syscalls with explainable machine learning algorithms, offering a new perspective on how to interpret container anomalies [28]. Yet another approach uses n-grams of syscalls to identify anomalies based on their occurrence probabilities [48]. Contrary to these baselinebased approaches that demand periodic retraining to adapt to normality shifts, our approach effectively detects anomalies by comparing the patterns of replicas while accommodating drifts without the need for retraining.…”
Section: Ixrelated Workmentioning
confidence: 99%
“…Hence, system call monitoring is a common technique for detecting suspicious behavior in compromised applications because malicious code has to use system calls to perform malicious operations. Tools like strace and ftrace are used to show the sequence of system calls made by a particular command or process [16]. Monitoring system calls can help identify and mitigate problems caused by compromised applications.…”
Section: System Callsmentioning
confidence: 99%
“…Frequency lists are not the sole method for using system call traces in machine learning applications. For instance, Srinivasan et al [16] used sequences of system calls with preserved order to create 𝑛-grams with Maximum Likelihood Estimator for anomaly detection in containers. Karn et al [23] used n-gram representation as well during detecting malicious processes inside containers.…”
Section: System Callsmentioning
confidence: 99%
“…Srinivasan et al [24] developed a real-time anomaly identification model that uses n-grams of system calls and the probability of their occurrence in Docker containers. The trace is processed using Maximum Likelihood Estimator (MLE) and Simple Good Turing (SGT) to provide a better estimate of system call sequence values.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, for this kind of applications, there is a need for a complementary security solution to monitor these malicious activities through intrusion detection tools. Some approaches have been published addressing the problem of intrusion detection at a container level for multi-tenancy applications [1,12,24], as reported in Section 2. However, these approaches present limited performance.…”
Section: Introductionmentioning
confidence: 99%