通信学报 ›› 2023, Vol. 44 ›› Issue (1): 49-63.doi: 10.11959/j.issn.1000-436x.2023008

• 学术论文 • 上一篇    下一篇

基于异构观测链的容器逃逸检测方法

张云涛1, 方滨兴1,2, 杜春来3, 王忠儒4, 崔志坚3, 宋首友1,5   

  1. 1 北京邮电大学网络空间安全学院,北京 100876
    2 广州大学网络空间先进技术研究院,广东 广州 510006
    3 北方工业大学信息学院,北京 100144
    4 中国网络空间研究院信息化研究所,北京 100010
    5 北京丁牛科技有限公司,北京 100081
  • 修回日期:2022-11-11 出版日期:2023-01-25 发布日期:2023-01-01
  • 作者简介:张云涛(1993- ),男,山西晋城人,北京邮电大学博士生,主要研究方向为网络安全、二进制脆弱性分析等
    方滨兴(1960- ),男,江西万年人,博士,中国工程院院士,北京邮电大学教授,主要研究方向为计算机体系结构、计算机网络、信息安全
    杜春来(1975- ),男,河北保定人,博士,北方工业大学副教授,主要研究方向为网络安全、恶意代码分析等
    王忠儒(1986- ),男,山东烟台人,博士,中国网络空间研究院高级工程师,主要研究方向为人工智能、网络安全
    崔志坚(1998- ),男,河北保定人,北方工业大学硕士生,主要研究方向为网络安全、漏洞挖掘
    宋首友(1989- ),男,云南昆明人,北京邮电大学博士生,主要研究方向为网络安全
  • 基金资助:
    国家自然科学基金资助项目(62172006);广东省重点研发计划基金资助项目(2019B010136003);国家重点研发计划基金资助项目(2019YFA0706404)

Container escape detection method based on heterogeneous observation chain

Yuntao ZHANG1, Binxing FANG1,2, Chunlai DU3, Zhongru WANG4, Zhijian CUI3, Shouyou SONG1,5   

  1. 1 School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
    2 Cyberspace Institute Advanced Technology, Guangzhou University, Guangzhou 510006, China
    3 School of Information Science and Technology, North China University of Technology, Beijing 100144, China
    4 Chinese Academy of Cyberspace Studies, Institute of Information Technology, Beijing 100010, China
    5 Beijing DigApis Technology Co., Ltd., Beijing 100081, China
  • Revised:2022-11-11 Online:2023-01-25 Published:2023-01-01
  • Supported by:
    The National Natural Science Foundation of China(62172006);The Key Research and Development Program of Guangdong Province(2019B010136003);The National Key Research and Development Program of China(2019YFA0706404)

摘要:

针对现有容器逃逸检测技术漏报率较高的问题,提出一种异构观测的实时检测方法。首先对利用内核漏洞的容器逃逸行为建模,选取进程的关键属性作为观测点,提出以“权限提升”为检测标准的异构观测方法;然后利用内核模块实时捕获进程的属性信息,构建进程起源图,并通过容器内外进程边界识别技术缩小起源图规模;最后基于进程属性信息构建异构观测链,实现原型系统HOC-Detector。实验结果表明,HOC-Detector可以成功检测测试数据集中利用内核漏洞的容器逃逸,并且运行时增加的总体开销低于0.8%。

关键词: 容器逃逸, 内核漏洞, 开放起源模型, 异构观测链

Abstract:

Aiming at the problem of high false negative rate in container escape detection technologies, a real-time detecting method of heterogeneous observation was proposed.Firstly, the container escape behavior utilizing kernel vulnerabilities was modeled, and the critical attributes of the process were selected as observation points.A heterogeneous observation method was proposed with “privilege escalation” as the detection criterion.Secondly, the kernel module was adopted to capture the attribute information of the process in real time, and the process provenance graph was constructed.The scale of the provenance graph was reduced through container boundary identification technology.Finally, a heterogeneous observation chain was built based on the process attribute information, and the prototype system HOC-Detector was implemented.The experiments show that HOC-Detector can successfully detect all container escapes using kernel vulnerabilities in the test dataset, and the increased runtime overhead is less than 0.8%.

Key words: container escape, kernel vulnerability, open provenance model, heterogeneous observation chain

中图分类号: 

No Suggested Reading articles found!