Malware detection for container runtime based on virtual machine introspection

被引:1
|
作者
He, Xinfeng [1 ,2 ]
Li, Riyang [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Peoples R China
[2] Key Lab High Trusted Informat Syst Hebei Prov, Baoding 071002, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 06期
关键词
Container; Virtual machine introspection; Container escape; Convolutional neural network; Malware detection;
D O I
10.1007/s11227-023-05727-w
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The isolation technique of containers introduces uncertain security risks to malware detection in the current container environment. In this paper, we propose a framework called Malware Detection for Container Runtime based on Virtual Machine Introspection (MDCRV) to detect in-container malware. MDCRV can automatically export the memory snapshots by using virtual machine introspection in container-in-virtual-machine architecture and reconstruct container semantics from memory snapshots. Although in-container malware might escape from the isolating measures of the container, our detecting program which benefits from the isolation of the hypervisor still can work well. Additionally, we propose a container process visualization approach to improve the efficiency of analyzing the binary execution information of container runtime. We convert the live processes of in-container malware and benign application to grayscale images and employ the convolutional neural network to extract malware features from the self-constructed dataset. The experimental results show that MDCRV achieves high accuracy while improving security.
引用
收藏
页码:7245 / 7268
页数:24
相关论文
共 50 条
  • [21] Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection
    Yonamine, Shun
    Kadobayashi, Youki
    Miyamoto, Daisuke
    Taenaka, Yuzo
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 471 - 478
  • [22] Android-based Smartphone Malware Exploit Prevention Using a Machine Learning-based Runtime Detection System
    Vijay, Athul
    Portillo-Dominguez, A. Omar
    Ayala-Rivera, Vanessa
    2022 10TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION, CONISOFT, 2022, : 131 - 139
  • [23] Towards virtual machine introspection based security framework for cloud
    Borisaniya, Bhavesh
    Patel, Dhiren
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (02):
  • [24] Towards virtual machine introspection based security framework for cloud
    Bhavesh Borisaniya
    Dhiren Patel
    Sādhanā, 2019, 44
  • [25] Virtual Machine Introspection: Techniques and Applications
    Hebbal, Yacine
    Laniepce, Sylvie
    Menaud, Jean-Marc
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 676 - 685
  • [26] A lightweight method for virtual machine introspection
    N. I. Fursova
    P. M. Dovgalyuk
    I. A. Vasil’ev
    V. A. Makarov
    Programming and Computer Software, 2017, 43 : 307 - 313
  • [27] Virtual machine introspection - Observation or interference?
    Nance, Kara
    Hay, Brian
    Bishop, Matt
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 32 - 37
  • [28] Malware Detection using Machine Learning Based Analysis of Virtual Memory Access Patterns
    Xu, Zhixing
    Ray, Sayak
    Subramanyan, Pramod
    Malik, Sharad
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 169 - 174
  • [29] A lightweight method for virtual machine introspection
    Fursova, N. I.
    Dovgalyuk, P. M.
    Vasil'ev, I. A.
    Makarov, V. A.
    PROGRAMMING AND COMPUTER SOFTWARE, 2017, 43 (05) : 307 - 313
  • [30] A virtual machine for merit-based runtime reconfiguration
    Greskamp, B
    Sass, R
    FCCM 2005: 13TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2005, : 287 - 288