4.7 Article

Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TPDS.2020.3029088

关键词

Containers; Cloud computing; Malware; Machine learning; Cryptocurrency; Data mining; Cryptomining; docker; kubernetes; containers; machine learning; explainability; pod; anomaly

资金

  1. IBM Research [W1463335]
  2. Khalifa University, Abu Dhabi, UAE [W1463335]

向作者/读者索取更多资源

The article discusses the increasing use of containers in cloud computing, simplified application management with Kubernetes, and the emerging security threat of cryptomining. It proposes using machine learning to detect malicious cryptomining software in Kubernetes pods and support management decisions with explainability tools.
The use of containers in cloud computing has been steadily increasing. With the emergence of Kubernetes, the management of applications inside containers (or pods) is simplified. Kubernetes allows automated actions like self-healing, scaling, rolling back, and updates for the application management. At the same time, security threats have also evolved with attacks on pods to perform malicious actions. Out of several recent malware types, cryptomining has emerged as one of the most serious threats with its hijacking of server resources for cryptocurrency mining. During application deployment and execution in the pod, a cryptomining process, started by a hidden malware executable can be run in the background, and a method to detect malicious cryptomining software running inside Kubernetes pods is needed. One feasible strategy is to use machine learning (ML) to identify and classify pods based on whether or not they contain a running process of cryptomining. In addition to such detection, the system administrator will need an explanation as to the reason(s) of the MLs classification outcome. The explanation will justify and support disruptive administrative decisions such as pod removal or its restart with a new image. In this article, we describe the design and implementation of an ML-based detection system of anomalous pods in a Kubernetes cluster by monitoring Linux-kernel system calls (syscalls). Several types of cryptominers images are used as containers within an anomalous pod, and several ML models are built to detect such pods in the presence of numerous healthy cloud workloads. Explainability is provided using SHAP, LIME, and a novel auto-encoding-based scheme for LSTM models. Seven evaluation metrics are used to compare and contrast the explainable models of the proposed ML cryptomining detection engine.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据