栗晓晗, 张新有. 基于系统调用的Docker容器异常检测[J]. 微电子学与计算机, 2022, 39(12): 77-85. DOI: 10.19304/J.ISSN1000-7180.2022.0205
引用本文: 栗晓晗, 张新有. 基于系统调用的Docker容器异常检测[J]. 微电子学与计算机, 2022, 39(12): 77-85. DOI: 10.19304/J.ISSN1000-7180.2022.0205
LI XiaoHan, ZHANG Xinyou. Docker anomaly detection based on system call[J]. Microelectronics & Computer, 2022, 39(12): 77-85. DOI: 10.19304/J.ISSN1000-7180.2022.0205
Citation: LI XiaoHan, ZHANG Xinyou. Docker anomaly detection based on system call[J]. Microelectronics & Computer, 2022, 39(12): 77-85. DOI: 10.19304/J.ISSN1000-7180.2022.0205

基于系统调用的Docker容器异常检测

Docker anomaly detection based on system call

  • 摘要: 随着虚拟化技术的爆炸式增长,Docker已占领了容器技术主流市场,但由于其轻量级的隔离方式导致安全问题频出.如阿里、京东、字节跳动等企业都开始采用Docker容器技术,容器安全与用户的财产安全紧密相关,而针对Docker容器安全的研究还存在较大欠缺,高效且安全的虚拟化解决方案需求也逐步增加.本文提出一种基于系统调用的Docker容器异常检测方案(Docker Anomaly Detection Based on System Call,DADBS),旨在通过分析系统调用序列,捕获容器运行时应用程序所发生的异常进程行为.DADBS通过跟踪容器内运行进程收集应用程序系统调用序列,结合系统调用级别及多级别TF-IDF量化评分筛选序列冗余信息,使用长短期记忆神经网络学习正常行为构建系统调用语言模型,最终采用余弦相似度偏差进行异常判断.经云环境下实验证明该模型在ADFA公开数据集上取得0.848的AUC值,且在Docker容器实际攻击场景都能够高效检测出进程异常行为.

     

    Abstract: With the explosive growth of virtualization technology, Docker has occupied the mainstream market of container technology, but due to its lightweight isolation approach has led to frequent security issues. Enterprises such as Ali, Jingdong and Byte Jump have started to adopt Docker container technology. Container security is closely related to the security of users' properties, while there is still a large lack of research on Docker container security, and the demand for efficient and secure virtualization solutions is gradually increasing. In this paper, we propose a Docker Anomaly Detection Based on System Call (DADBS), which aims to capture the abnormal process behaviour of the application while the container is running by analysing the sequence of system calls. DADBS collects the application system call sequences by tracking the running processes in the container, filters the redundant information of the sequences by combining the system call levels and multi-level TF-IDF quantization scores, uses long and short-term memory neural networks to learn the normal behavior to build the system call language model, and finally uses the cosine similarity deviation to determine the abnormality. Experiments in the cloud environment demonstrate that the model achieves an AUC value of 0.848 on the ADFA public dataset, and can efficiently detect process anomalies in actual attack scenarios on Docker containers.

     

/

返回文章
返回