Journal on Communications ›› 2023, Vol. 44 ›› Issue (1): 49-63.doi: 10.11959/j.issn.1000-436x.2023008

• Papers • Previous Articles     Next Articles

Container escape detection method based on heterogeneous observation chain

Yuntao ZHANG1, Binxing FANG1,2, Chunlai DU3, Zhongru WANG4, Zhijian CUI3, Shouyou SONG1,5   

  1. 1 School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
    2 Cyberspace Institute Advanced Technology, Guangzhou University, Guangzhou 510006, China
    3 School of Information Science and Technology, North China University of Technology, Beijing 100144, China
    4 Chinese Academy of Cyberspace Studies, Institute of Information Technology, Beijing 100010, China
    5 Beijing DigApis Technology Co., Ltd., Beijing 100081, China
  • Revised:2022-11-11 Online:2023-01-25 Published:2023-01-01
  • Supported by:
    The National Natural Science Foundation of China(62172006);The Key Research and Development Program of Guangdong Province(2019B010136003);The National Key Research and Development Program of China(2019YFA0706404)

Abstract:

Aiming at the problem of high false negative rate in container escape detection technologies, a real-time detecting method of heterogeneous observation was proposed.Firstly, the container escape behavior utilizing kernel vulnerabilities was modeled, and the critical attributes of the process were selected as observation points.A heterogeneous observation method was proposed with “privilege escalation” as the detection criterion.Secondly, the kernel module was adopted to capture the attribute information of the process in real time, and the process provenance graph was constructed.The scale of the provenance graph was reduced through container boundary identification technology.Finally, a heterogeneous observation chain was built based on the process attribute information, and the prototype system HOC-Detector was implemented.The experiments show that HOC-Detector can successfully detect all container escapes using kernel vulnerabilities in the test dataset, and the increased runtime overhead is less than 0.8%.

Key words: container escape, kernel vulnerability, open provenance model, heterogeneous observation chain

CLC Number: 

No Suggested Reading articles found!