Netinfo Security ›› 2024, Vol. 24 ›› Issue (4): 534-544.doi: 10.3969/j.issn.1671-1122.2024.04.004
Previous Articles Next Articles
LIU Sinuo1,2, RUAN Shuhua1,2(), CHEN Xingshu1,2, ZHENG Tao1,2
Received:
2024-01-29
Online:
2024-04-10
Published:
2024-05-16
CLC Number:
LIU Sinuo, RUAN Shuhua, CHEN Xingshu, ZHENG Tao. An eBPF-Based Threat Observability System for Cloud-Oriented Environment[J]. Netinfo Security, 2024, 24(4): 534-544.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2024.04.004
观测点位 | 探针名称 |
---|---|
nsSwtich(sys-kernel-kfunc, new_ns) | sys/kernel/kfunc/nsSwtich(new_ns) |
preKCred(sys-kernel-kfunc, daemon) | sys/kernel/kfunc/preKCred(daemon) |
commitCred(sys-kernel-kfunc, cred->uid, cred->gid) | sys/kernel/kfunc/commitCred(cred->uid, cred->gid) |
setns(sys-si-syscall, fd, nstype) | sys/si/syscall/setns(fd, nstype) |
socket(net, src_ip, src_pot, dst_ip, dst_port, fd) | net/socket(sip, sp, dip, sp, fd) |
tcp(net-L4, src_ip, src_port, dst_ip, dst_port) | net/L4/tcpconn(sip, sp, dip, sp) |
http(net-L7, src_ip, src_port, dst_ip, dst_port, paylaod) | net/L7/http(sip, sp, dip, sp, payload) |
[1] | CHAYKOVSKY V. STRACE[EB/OL]. [2024-01-23]. https://strace.io/. |
[2] | SYSSTAT. Sysstat Home Page[EB/OL]. (2023-12-17)[2024-01-23]. https://sysstat.github.io/. |
[3] | MCCANNE S, JACOBSON V. TCPDUMP & LiBPCAP[EB/OL]. [2024-01-23]. https://www.tcpdump.org/. |
[4] | WIKIPEDIA. Observability[EB/OL]. (2023-12-21)[2024-01-23]. https://en.wikipedia.org/w/index.php?title=Observability&oldid=1191145038. |
[5] | CALAVERA D, FONTANA L. Linux Observability with BPF: Advanced Programming for Performance Analysis and Networking[M]. Boston: O’Reilly Media, 2019. |
[6] | WIKIPEDIA. eBPF[EB/OL]. (2024-01-05)[2024-01-23]. https://en.wikipedia.org/w/index.php?title=EBPF&oldid=1193818980. |
[7] | Tencent Cloud Computing (Beijing) Co., Ltd. Tencent Cloud Container Security White Paper[EB/OL]. (2021-11-09)[2024-01-23]. https://cloud.tencent.com/developer/article/1898557. |
腾讯云计算北京有限公司. 腾讯云容器安全白皮书[EB/OL]. (2021-11-09)[2024-01-23]. https://cloud.tencent.com/developer/article/1898557. | |
[8] | The/proc Filesystem. The Linux Kernel Documentation[EB/OL]. [2024-01-23]. https://www.kernel.org/doc/html/next/filesystems/proc.html. |
[9] | SYED H J, GANI A, NASARUDDIN F H, et al. CloudProcMon: A Non-Intrusive Cloud Monitoring Framework[J]. IEEE Access, 2018, 6: 44591-44606. |
[10] | LAI C A, KIMBALL J, ZHU Tao, et al. MilliScope: A Fine-Grained Monitoring Framework for Performance Debugging of N-Tier Web Services[C]// IEEE. 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). New York: IEEE, 2017: 92-102. |
[11] | CORDINGLY R, YU Hanfei, HOANG V, et al. The Serverless Application Analytics Framework: Enabling Design Trade-off Evaluation for Serverless Software[C]// ACM. The 2020 Sixth International Workshop on Serverless Computing. New York: ACM, 2021: 67-72. |
[12] | DATTA P, KUMAR P, MORRIS T, et al. Valve: Securing Function Workflows on Serverless Computing Platforms[C]// ACM. The Web Conference 2020. New York: ACM, 2020: 939-950. |
[13] | DATTA P, POLINSKY I, INAM M A, et al. {ALASTOR}: Reconstructing the Provenance of Serverless Intrusions[C]// USENIX. 31st USENIX Security Symposium (USENIX Security 22). Berkeley: USENIX, 2022: 2443-2460. |
[14] | CHEN Pengfei, QI Yong, HOU Di. CauseInfer: Automated End-to-End Performance Diagnosis with Hierarchical Causality Graph in Cloud Environment[J]. IEEE Transactions on Services Computing, 2019, 12(2): 214-230. |
[15] | WANG Yulong, WANG Qixu, CHEN Xingshu, et al. ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform[J]. IEEE Transactions on Industrial Informatics, 2022, 18(5): 3327-3336. |
[16] | ZHAN Mengqi, LI Yang, YANG Huiran, et al. Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers[J]. IEEE Transactions on Services Computing, 2022, 16(3): 1-12. |
[17] | ZOU Zhuping, XIE Yulai, HUANG Kai, et al. A Docker Container Anomaly Monitoring System Based on Optimized Isolation Forest[J]. IEEE Transactions on Cloud Computing, 2022, 10(1): 134-145. |
[18] | SAKURABA M, KAWASAKI J, MIYASAKA T, et al. An Anomaly Detection Approach by Aiml in Ip Networks with eBPF-Based Observability[C]// IEEE. 2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS). New York, 2023: 171-176. |
[19] | WU Shenglin, LIU Wanggen, YAN Ming, et al. A Real-Time Anomaly Detection System for Container Clouds Based on Unsupervised System Call Rule Generation[J]. Netinfo Security, 2023, 23(12): 91-102. |
吴圣麟, 刘汪根, 严明, 等. 基于无监督系统调用规则生成的容器云实时异常检测系统[J]. 信息网络安全, 2023, 23(12): 91-102. | |
[20] | LIU Chang, CAI Zhengong, WANG Bingshen, et al. A Protocol-Independent Container Network Observability Analysis System Based on eBPF[C]// IEEE. 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS). New York: IEEE, 2020: 697-702. |
[21] | LIU Chang. Methodology and Practice of Container Network Observability Based on eBPF[D]. Hangzhou: Zhejiang University, 2021. |
刘畅. 基于eBPF的容器网络可观测性方法与实践[D]. 杭州: 浙江大学, 2021. | |
[22] | LEVIN J, BENSON T A. ViperProbe: Rethinking Microservice Observability with eBPF[C]// IEEE. 2020 IEEE 9th International Conference on Cloud Networking (CloudNet). New York: IEEE, 2020: 1-8. |
[23] | WANG Zhe, MA Teng, KONG Linghe, et al. Zero Overhead Monitoring for Cloud-Native Infrastructure Using {RDMA}[C]// USENIX. 2022 USENIX Annual Technical Conference (USENIX ATC 22). Berkeley: USENIX, 2022: 639-654. |
[24] | LIN Xin, LEI Lingguang, WANG Yuewu, et al. A Measurement Study on Linux Container Security: Attacks and Countermeasures[C]// ACM. The 34th Annual Computer Security Applications Conference. New York: ACM, 2018: 418-429. |
[25] | DAS-SECURITY Co., Ltd. Docker Port 2375 Vulnerability Network-Wide Security Risk Report[EB/OL]. (2017-02-22)[2024-01-22]. https://cloud.tencent.com/developer/article/1090829. |
杭州安恒信息技术股份有限公司. Docker 2375端口漏洞全网安全风险报告[EB/OL]. (2017-02-22)[2024-01-22]. https://cloud.tencent.com/developer/article/1090829. | |
[26] | IOVISOR/BCC[EB/OL]. IO Visor Project, 2024[2024-01-23]. https://github.com/iovisor/bcc. |
[27] | WIKIPEDIA. Ftrace[EB/OL]. (2023-11-29)[2024-01-23]. . |
[28] | DAMATO J. ltrace[EB/OL]. (2023-11-29)[2024-01-23]. https://github.com/ice799/ltrace. |
[1] | ZHENG Luxin, ZHANG Jian. Threats and Future Development Trends to the Cloud Security [J]. Netinfo Security, 2021, 21(10): 17-24. |
[2] | Pu ZHAO, Wei CUI, Rong HAO, Jia YU. A Secure Outsourcing Computation Scheme for El-Gamal Signature Generation [J]. Netinfo Security, 2019, 19(3): 81-86. |
[3] | Zhenfeng ZHANG, Zhiwen ZHANG, Ruichao WANG. Model of Cloud Computing Security and Compliance Capability for Classified Protection of Cybersecurity 2.0 [J]. Netinfo Security, 2019, 19(11): 1-7. |
[4] | Congdong LV, Zhen HAN. A Security Model of Cloud Computing Based on IP Model [J]. Netinfo Security, 2018, 18(11): 27-32. |
[5] | Xiaobing CHEN, Kai CHEN, Zhen XU, Liming WANG. Security Supervisory Scheme for Industrial Control Networks [J]. Netinfo Security, 2016, 16(7): 61-70. |
[6] | Ru-hui ZHANG, Chun-mei GUO, Xue-yao BI. Research on Security Policies of U.S Government Cloud [J]. Netinfo Security, 2015, 15(9): 257-261. |
[7] | Xue-min CHEN, Ying SHA. Research on Social Network Data Acquisition Technology Based on Browser Test Components [J]. Netinfo Security, 2015, 15(5): 56-61. |
[8] | Zheng1 TAO, Jun1 HU, Huan1 Wu, Jing1 Yang. Research and Application of Cloud Computing Tenant Virtual Machine Active Trusted Verify Mechanism [J]. Netinfo Security, 2015, 15(11): 21-26. |
[9] | LI Hui, ZHANG Ru, LIU Jian-yi, ZHAO Jing. Safety Assessment on Digital Radio Transmission based on Attack Tree Model [J]. 信息网络安全, 2014, 14(8): 71-76. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||