Detecting Cryptojacking Containers Using eBPF-Based Security Runtime and Machine Learning
- Abstract
- As the use of containers has become mainstream in the cloud environment, various security threats targeting containers have also been increasing. Among them, a notable malicious activity is a cryptojacking attack that steals resources without the consent of an instance owner to mine cryptocurrency. However, detecting such anomalies in a containerized environment is more complex because containers share the host kernel, making it challenging to pinpoint resource usage and anomalies at the container granularity without introducing significant overhead. To this end, this study proposes a runtime detection framework for identifying malicious mining behaviors in the cloud-native environment. By leveraging Tetragon, a runtime security tool based on the extended Berkeley Packet Filter (eBPF), we capture system call traces and flow-level information of cryptojacking containers to extract rich feature representations for training and evaluating various machine learning models. As a result of the experiment, our framework delivers up to 99.75% classification accuracy with moderate runtime monitoring overhead.
- Author(s)
- 김성민; 김리영; 유정은; 이수민; 김수민
- Issued Date
- 2025-03-19
- Type
- Article
- Keyword
- 컴퓨터보안
- DOI
- 10.3390/electronics14061208
- URI
- http://repository.sungshin.ac.kr/handle/2025.oak/8697
- Publisher
- MDPI
- ISSN
- 2079-9292
-
Appears in Collections:
- 융합보안공학과 > 학술논문
- 공개 및 라이선스
-
- 파일 목록
-
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.