OAK

Detecting Cryptojacking Containers Using eBPF-Based Security Runtime and Machine Learning

Metadata Downloads
Abstract
As the use of containers has become mainstream in the cloud environment, various security threats targeting containers have also been increasing. Among them, a notable malicious activity is a cryptojacking attack that steals resources without the consent of an instance owner to mine cryptocurrency. However, detecting such anomalies in a containerized environment is more complex because containers share the host kernel, making it challenging to pinpoint resource usage and anomalies at the container granularity without introducing significant overhead. To this end, this study proposes a runtime detection framework for identifying malicious mining behaviors in the cloud-native environment. By leveraging Tetragon, a runtime security tool based on the extended Berkeley Packet Filter (eBPF), we capture system call traces and flow-level information of cryptojacking containers to extract rich feature representations for training and evaluating various machine learning models. As a result of the experiment, our framework delivers up to 99.75% classification accuracy with moderate runtime monitoring overhead.
Author(s)
김성민김리영유정은이수민김수민
Issued Date
2025-03-19
Type
Article
Keyword
컴퓨터보안
DOI
10.3390/electronics14061208
URI
http://repository.sungshin.ac.kr/handle/2025.oak/8697
Publisher
MDPI
ISSN
2079-9292
Appears in Collections:
융합보안공학과 > 학술논문
공개 및 라이선스
  • 공개 구분공개
파일 목록
  • 관련 파일이 존재하지 않습니다.

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.