Back to Search
Start Over
Container Escape Detection for Edge Devices
- Source :
- SenSys, Pope, J, Raimondo, F, Kumar, V, McConville, R, Piechocki, R J, Oikonomou, G, Paquier, T, Luo, B, Howarth, D, Mavromatis, I, Carnelli, P E, Sanchez-Mompo, A, Spyridopoulos, T & Khan, A 2021, ' Container Escape Detection for Edge Devices ', Paper presented at 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, 15/11/21-17/11/21 pp. 532-536 . https://doi.org/10.1145/3485730.3494114
- Publication Year :
- 2021
- Publisher :
- ACM, 2021.
-
Abstract
- Edge computing is rapidly changing the IoT-Cloud landscape. Various testbeds are now able to run multiple Docker-like containers developed and deployed by end-users on edge devices. However, this capability may allow an attacker to deploy a malicious container on the host and compromise it. This paper presents a dataset based on the Linux Auditing System, which contains malicious and benign container activity. We developed two malicious scenarios, a denial of service and a privilege escalation attack, where an adversary uses a container to compromise the edge device. Furthermore, we deployed benign user containers to run in parallel with the malicious containers. Container activity can be captured through the host system via system calls. Our time series auditd dataset contains partial labels for the benign and malicious related system calls. Generating the dataset is largely automated using a provided AutoCES framework. We also present a semi-supervised machine learning use case with the collected data to demonstrate its utility. The dataset and framework code are open-source and publicly available.
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems
- Accession number :
- edsair.doi.dedup.....f332e82d55afad321b07f67c8f29f80b
- Full Text :
- https://doi.org/10.1145/3485730.3494114