4.7 Article

Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TPDS.2020.3029088

Keywords

Containers; Cloud computing; Malware; Machine learning; Cryptocurrency; Data mining; Cryptomining; docker; kubernetes; containers; machine learning; explainability; pod; anomaly

Funding

  1. IBM Research [W1463335]
  2. Khalifa University, Abu Dhabi, UAE [W1463335]

Ask authors/readers for more resources

The article discusses the increasing use of containers in cloud computing, simplified application management with Kubernetes, and the emerging security threat of cryptomining. It proposes using machine learning to detect malicious cryptomining software in Kubernetes pods and support management decisions with explainability tools.
The use of containers in cloud computing has been steadily increasing. With the emergence of Kubernetes, the management of applications inside containers (or pods) is simplified. Kubernetes allows automated actions like self-healing, scaling, rolling back, and updates for the application management. At the same time, security threats have also evolved with attacks on pods to perform malicious actions. Out of several recent malware types, cryptomining has emerged as one of the most serious threats with its hijacking of server resources for cryptocurrency mining. During application deployment and execution in the pod, a cryptomining process, started by a hidden malware executable can be run in the background, and a method to detect malicious cryptomining software running inside Kubernetes pods is needed. One feasible strategy is to use machine learning (ML) to identify and classify pods based on whether or not they contain a running process of cryptomining. In addition to such detection, the system administrator will need an explanation as to the reason(s) of the MLs classification outcome. The explanation will justify and support disruptive administrative decisions such as pod removal or its restart with a new image. In this article, we describe the design and implementation of an ML-based detection system of anomalous pods in a Kubernetes cluster by monitoring Linux-kernel system calls (syscalls). Several types of cryptominers images are used as containers within an anomalous pod, and several ML models are built to detect such pods in the presence of numerous healthy cloud workloads. Explainability is provided using SHAP, LIME, and a novel auto-encoding-based scheme for LSTM models. Seven evaluation metrics are used to compare and contrast the explainable models of the proposed ML cryptomining detection engine.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available