Secure Namespaced Kernel Audit for Containers

11/03/2021
by   Soo Yee Lim, et al.
0

Despite the wide usage of container-based cloud computing, container auditing for security analysis relies mostly on built-in host audit systems, which often lack the ability to capture high-fidelity container logs. State-of-the-art reference-monitor-based audit techniques greatly improve the quality of audit logs, but their system-wide architecture is too costly to be adapted for individual containers. Moreover, these techniques typically require extensive kernel modifications, making them difficult to deploy in practical settings. In this paper, we present saBPF (secure audit BPF), an extension of the eBPF framework capable of deploying secure system-level audit mechanisms at the container granularity. We demonstrate the practicality of saBPF in Kubernetes by designing an audit framework, an intrusion detection system, and a lightweight access control mechanism. We evaluate saBPF and show that it is comparable in performance and security guarantees to audit systems from the literature that are implemented directly in the kernel.

READ FULL TEXT

page 2

page 3

page 6

research
11/25/2018

Towards Blockchain-Driven, Secure and Transparent Audit Logs

Audit logs serve as a critical component in the enterprise business syst...
research
08/09/2023

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

Provenance graphs are structured audit logs that describe the history of...
research
07/21/2019

Secure and Transparent Audit Logs with BlockAudit

Audit logs serve as a critical component in enterprise business systems ...
research
11/14/2017

Practical Whole-System Provenance Capture

Data provenance describes how data came to be in its present form. It in...
research
07/09/2023

A Lightweight Approach for Network Intrusion Detection based on Self-Knowledge Distillation

Network Intrusion Detection (NID) works as a kernel technology for the s...
research
08/18/2018

Runtime Analysis of Whole-System Provenance

Identifying the root cause and impact of a system intrusion remains a fo...
research
06/08/2022

A Framework for Building Secure, Scalable, Networked Enclaves

In 2020, Amazon introduced Nitro enclaves – cloud-based secure enclaves ...

Please sign up or login with your details

Forgot password? Click here to reset