Container Anomaly Detection Using Neural Networks Analyzing System Calls

被引:5
|
作者
Gantikow, Holger [1 ]
Zoehner, Tom [1 ]
Reich, Christoph [1 ]
机构
[1] Furtwangen Univ Appl Sci, Inst Data Sci Cloud Comp & IT Secur, Furtwangen, Germany
关键词
Container Security; Anomaly Detection; Neural Networks;
D O I
10.1109/PDP50117.2020.00069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Container environments permeate all areas of computing, such as HPC, since they are lightweight, efficient, and ease the deployment of software. However, due to the shared host kernel, their isolation is considered to be weak, so additional protection mechanisms are needed. This paper shows that neural networks can be used to do anomaly detection by observing the behavior of containers through system call data. In more detail the detection of anomalies in file and directory paths used by system calls is evaluated to show their advantages and drawbacks.
引用
收藏
页码:408 / 412
页数:5
相关论文
共 50 条
  • [1] Electric Power System anomaly detection using neural networks
    Martinelli, M
    Tronci, E
    Dipoppa, G
    Balducelli, C
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2004, 3213 : 1242 - 1248
  • [2] Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks
    Cordero, Carlos Garcia
    Hauke, Sascha
    Muhlhauser, Max
    Fischert, Mathias
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [3] Network anomaly detection using neural networks
    Globa, L. S.
    Demidova, Y. A.
    Ternovoy, M. Y.
    2006 16TH INTERNATIONAL CRIMEAN CONFERENCE MICROWAVE & TELECOMMUNICATION TECHNOLOGY, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 412 - +
  • [4] Efficient Approach for Anomaly Detection in IoT Using System Calls
    Shamim, Nouman
    Asim, Muhammad
    Baker, Thar
    Awad, Ali Ismail
    SENSORS, 2023, 23 (02)
  • [5] Anomaly intrusion detection for system call using the Soundex algorithm and neural networks
    Cha, BR
    Vaidya, B
    Han, S
    10TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2005, : 427 - 433
  • [6] A Novel Anomaly Detection System on the Internet of Railways Using Extended Neural Networks
    Islam, Umar
    Malik, Rami Qays
    Al-Johani, Amnah S.
    Khan, Muhammad Riaz
    Daradkeh, Yousef Ibrahim
    Ahmad, Ijaz
    Alissa, Khalid A.
    Abdul-Samad, Zulkiflee
    Tag-Eldin, Elsayed M.
    ELECTRONICS, 2022, 11 (18)
  • [7] Network Anomaly Detection Using Artificial Neural Networks
    Andropov, Sergey
    Guirik, Alexei
    Budko, Mikhail
    Budko, Marina
    PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 26 - 31
  • [8] Anomaly Detection using Data Clustering and Neural Networks
    Qiu, Hai
    Eklund, Neil
    Hu, Xiao
    Yan, Weizhong
    Iyer, Naresh
    2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 3627 - 3633
  • [9] A study in using neural networks for anomaly and misuse detection
    Ghosh, AK
    Schwartzbard, A
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 141 - 151
  • [10] Study on HMM Based Anomaly Intrusion Detection Using System Calls
    Shi Shang-zhe
    Sun Mei-feng
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC & MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY (EMEIT-2012), 2012, 23