<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Enhancing Container Runtime Security: A Case Study in Threat Detection</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Amina</forename><surname>Eldjou</surname></persName>
							<email>amina.eldjou@univ-constantine2.dz</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Constantine</orgName>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Abdelhamid Mehri</orgName>
								<address>
									<settlement>Constantine</settlement>
									<country key="DZ">Algeria</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="laboratory">LISIA Laboratory</orgName>
								<orgName type="institution">University Abdelhamid Mehri</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Moahmed</forename><forename type="middle">Elhadi</forename><surname>Amoura</surname></persName>
							<email>mohamedelhadi.amoura@univ-constantine2.dz</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Constantine</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mohcene</forename><surname>Soltane</surname></persName>
							<email>mohcene.soltane@univ-constantine2.dz</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Constantine</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Meriem</forename><surname>Belguidoum</surname></persName>
							<email>meriem.belguidoum@univ-constantine2.dz</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Constantine</orgName>
							</affiliation>
							<affiliation key="aff3">
								<orgName type="institution">LIRE Laboratory University Abdelhamid</orgName>
								<address>
									<addrLine>Mehri 4 Octodet</addrLine>
									<settlement>London</settlement>
									<country key="GB">England</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Samir</forename><surname>Bennacer</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Ilham</forename><surname>Kitouni</surname></persName>
							<email>ilham.kitouni@univ-constantine2.dz</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Constantine</orgName>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Abdelhamid Mehri</orgName>
								<address>
									<settlement>Constantine</settlement>
									<country key="DZ">Algeria</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="laboratory">LISIA Laboratory</orgName>
								<orgName type="institution">University Abdelhamid Mehri</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Enhancing Container Runtime Security: A Case Study in Threat Detection</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">B25766DDCAE171D70A6F946561E8F063</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T18:39+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cloud native</term>
					<term>Threat detection</term>
					<term>Container runtime</term>
					<term>Cybersecurity</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In recent years, advances in software development, operation, and maintenance technologies have driven the increasing prevalence of Cloud native architecture. This architectural approach offers efficient virtualization, resource isolation, and effective management capabilities. However, ensuring robust security within these dynamic and scalable environments is crucial. Traditional security tools suffer from a lack of visibility and effectiveness in threat detection. Research studies have suggested log management solutions, log aggregation, and real-time log analysis to identify patterns, anomalies, and threat detection. While these solutions are effective, they suffer from a lack of visibility, which is our research focus. This paper suggests a comprehensive solution that aims to enhance threat detection in containerized systems. By leveraging the combined capabilities of Cilium Tetragon and Elastic Stack, the proposed solution offers an easy integration that enhances the visibility of containerized environments and Simplifying the process of analyzing logs. This integration empowers security professionals to gain comprehensive insights, enabling them to efficiently detect and address any anomalous or malicious activities occurring within the container runtime.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Over the past few years, the increasing advancements in software development, operation, and maintenance technologies have led to the increased prominence of Cloud native architecture. This architectural approach has gained popularity due to its distinctive characteristics, such as efficient virtualization, the ability to isolate resources, and effective management capabilities. 37% of organizations have experienced a container security incident, this number is expected to increase in 2023, as more and more organizations adopt containerized applications.</p><p>Cloud native is a term used to describe a set of technologies and practices that are designed to build and run scalable applications in modern, dynamic environments such as Cloud computing platforms <ref type="bibr" target="#b0">[1]</ref>.</p><p>The term Cloud native was coined by the Cloud native Computing Foundation (CNCF) <ref type="bibr" target="#b0">[1]</ref>. The CNCF defines Cloud native as technologies that are built to run in a Cloud environment and benefit from its elasticity, distributed architecture, and ability to rapidly release new features. However, ensuring robust security within these dynamic and scalable ecosystems is crucial. Traditional security tools face challenges in containerized environments due to the nature of container infrastructures <ref type="bibr" target="#b1">[2]</ref>. According to the Cloud native Computing Foundation, container usage in production has seen a great increase between 2016 and 2022 <ref type="bibr" target="#b2">[3]</ref>. In the Cloud native computing and containers world, security plays a crucial role like any other platform or system. While the recent State of Kubernetes 2022 survey highlighted the continual rise of Cloud native adoption among organizations, it has also become a popular target for threats and vulnerabilities <ref type="bibr" target="#b3">[4]</ref>. By implementing effective security measures, organizations can mitigate risks, protect sensitive data, and provide a detailed investigation report. For example, a Kubernetes pod may run for a short time before being automatically terminated and its resources reused <ref type="bibr" target="#b4">[5]</ref>. Traditional security tools may not be able to detect suspicious activity in a timely manner, and they may not be able to collect the necessary data to investigate an attack. Additionally, some traditional security tools, such as web application firewalls, next-generation firewalls, and endpoint security, are not effective in container environments because they do not have visibility into the entire container ecosystem.</p><p>Taking this further, the current study focuses on a comprehensive approach to enhance threat detection using Cilium Tetragon and Elastic Stack. This integration offers deep visibility into containerized environments, simplifying log analysis for professionals to identify abnormal or malicious activities in real time. The solution addresses timely threat detection by enabling real-time monitoring and alerting. It empowers security operation center (SOC) analysts to promptly respond to potential threats in the container runtime environment. In summary, this paper proposes a solution to enhance threat detection in containerized systems through powerful visibility tools and real-time log analysis, aiding SOC analysts in identifying threats or malicious behavior. The paper's structure includes Section 2 for foundational insights into Cloud native computing and security considerations, Section 3 exploring relevant threat detection tools, Section 4 detailing the proposed approach, Section 6 interpreting findings and suggesting future directions, and Section 7 concluding the paper and outlining future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Cloud native</head><p>Cloud native computing is an approach to developing and deploying applications that takes full advantage of Cloud computing principles <ref type="bibr" target="#b0">[1]</ref>. A new approach to software development emerged as a result of the need for more efficient, scalable, and agile software solutions in modern IT environments. Cloud native applications are software programs that consist of multiple small, interdependent services called microservices. The key characteristics of Cloud native applications include firstly, Microservices architecture decomposes applications into small, loosely coupled services by functionality area <ref type="bibr" target="#b0">[1]</ref>, offering benefits like increased agility, scalability, and maintainability <ref type="bibr" target="#b5">[6]</ref>. Secondly, the Service Mesh is a dedicated infrastructure layer that simplifies communication between microservices in Cloud-native applications <ref type="bibr" target="#b0">[1]</ref>, enhancing development, deployment, and management <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b5">6]</ref>. Containerization encapsulates software with OS components into portable containers, with Docker containers as a common example <ref type="bibr">[7,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr">9]</ref>. Linux OS utilizes namespaces and control groups to achieve isolation and resource management <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b8">10]</ref>. Container orchestration platforms automate deployment and scaling <ref type="bibr" target="#b9">[11,</ref><ref type="bibr" target="#b0">1]</ref>, while Continuous Integration and Continuous Delivery (CI/CD) streamline code development and deployment <ref type="bibr" target="#b10">[12,</ref><ref type="bibr" target="#b0">1]</ref>. Lastly, Serverless, a Cloud-native model <ref type="bibr" target="#b0">[1]</ref>, enables server-free application development <ref type="bibr" target="#b11">[13]</ref>. These concepts collectively shape the Cloud-native ecosystem, as supported by referenced literature.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">The 4C's of Cloud Native Security</head><p>Ensuring robust security in Cloud native environments involves a layered security approach. The four C's represent the essential layers of Cloud native security: Cloud, Code, Container, and Cluster. Developers and DevOps teams must adhere to Cloud computing best practices across these layers to achieve security goals before user access. Each layer builds upon the next, and addressing security at the Code level relies on the foundation provided by the Cloud, Cluster, and Container layers <ref type="bibr" target="#b12">[14,</ref><ref type="bibr" target="#b0">1,</ref><ref type="bibr" target="#b3">4]</ref>.</p><p>Code, at the core of applications, demands robust security measures like access management, threat monitoring, and TLS encryption to mitigate risks <ref type="bibr" target="#b12">[14]</ref>. Once developed, code can be containerized, packaging it and its dependencies into lightweight, portable units <ref type="bibr" target="#b0">[1]</ref>. This containerization ensures consistent, efficient deployment across diverse environments, maintaining the application's reliability on various systems <ref type="bibr" target="#b2">[3]</ref>. Clusters, comprised of individual services or workloads running in separate containers, interconnected over a network, form an integral part of this ecosystem <ref type="bibr" target="#b4">[5]</ref>. Cloud computing services provide on-demand IT resources over the internet with pay-as-you-go pricing, operating within virtualized computing environments and enabling easy access to a multitude of services and applications without the need for physical hardware <ref type="bibr" target="#b13">[15]</ref>. Thus, each layer of the Cloud Native security model is interdependent. A code layer's strength is reinforced by its underlying security layers (Cloud, Cluster, Container). This layered approach augments the defense in depth computing approach to security, which is widely regarded as a best practice for securing software systems <ref type="bibr" target="#b12">[14]</ref>. This study will focus on the container layer specifically the runtime security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Container runtime security</head><p>Container runtime security is critical in the cloud computing landscape, especially in microservice architectures where containers are prevalent for efficient, scalable, and portable application deployment <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b14">16,</ref><ref type="bibr" target="#b15">17]</ref>. However, the use of containers introduces new vulnerabilities and attack vectors, posing risks to both applications and host systems' security and integrity <ref type="bibr" target="#b8">[10]</ref>. To address these challenges comprehensively, a holistic approach to container runtime security is essential <ref type="bibr" target="#b8">[10]</ref>.</p><p>During an application's active runtime, unforeseen security risks may emerge, including overlooked vulnerabilities or setup errors from the build phase <ref type="bibr" target="#b15">[17]</ref>. Attackers can exploit these weaknesses, necessitating real-time monitoring for unusual behavior. Anomaly detection at runtime can identify privilege escalations, cryptomining, unexpected network flows, container escape attempts, and other insecure activities.</p><p>Linux kernel features play a pivotal role in container security, leveraging namespaces, control groups (cgroups), and Seccomp <ref type="bibr" target="#b15">[17,</ref><ref type="bibr" target="#b8">10,</ref><ref type="bibr" target="#b16">18,</ref><ref type="bibr" target="#b18">19]</ref>. Namespaces segregate system resources, ensuring container independence <ref type="bibr" target="#b16">[18,</ref><ref type="bibr" target="#b18">19]</ref>. Cgroups allocate and restrict resources, preventing contention and ensuring fair utilization <ref type="bibr" target="#b16">[18,</ref><ref type="bibr" target="#b18">19]</ref>. Seccomp filters system calls, reducing the attack surface <ref type="bibr" target="#b16">[18,</ref><ref type="bibr" target="#b18">19]</ref>.</p><p>Within this context, the Berkeley Packet Filter (BPF) and its extension, eBPF, enable advanced observability and tracing in container environments, enhancing security <ref type="bibr" target="#b16">[18,</ref><ref type="bibr" target="#b18">19,</ref><ref type="bibr" target="#b8">10]</ref>. BPF safely executes programs triggered by kernel events, offering safety assurances against crashes and malicious actions <ref type="bibr" target="#b16">[18,</ref><ref type="bibr" target="#b18">19]</ref>. It provides real-time security observability, speed, and convenience for monitoring high-volume event data, making it a safer and efficient option compared to traditional methods <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref>. By offering deeper insights into observability, eBPF ensures secure, non-intrusive telemetry data collection from the entire system <ref type="bibr" target="#b20">[21]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.">Threat detection in Cloud native</head><p>. Threat detection is the identification, location, and reporting of activities or weapons that could harm a system, network, or target. It can be real-time or retroactive, automated or manual, distinct from threat response, which aims to counter threats. In the dynamic cybersecurity field, effective threat detection is crucial for proactively addressing vulnerabilities and preventing cyber-attacks, data breaches, and security compromises. Recognizing unauthorized activities and anomalies in system behavior is key to mitigating potential damage inflicted by cyber adversaries <ref type="bibr" target="#b21">[22]</ref>.</p><p>To achieve this, there exist two prominent methodologies for threat detection <ref type="bibr" target="#b21">[22]</ref>: First, the system makes a detailed profile of the normal activities of the system, network, or program to detect anomalies. Malicious behavior is defined as any deviation from the baseline. Second, signature-based detection is used to detect previously known malicious activities that match a signature or rules-based protocol that model the user's behavior.</p><p>Through the systematic analysis of system behavior and the continuous monitoring, threat detection stands as a proactive force that contributes significantly to safeguarding digital assets and maintaining the integrity of critical systems and networks <ref type="bibr" target="#b14">[16]</ref>. In the context of container runtime environment threat detection requires a multi-faceted approach that combines anomaly-based detection, real-time monitoring, intrusion detection systems, and the integration of threat intelligence. By continuously monitoring container behavior, network traffic, and system interactions <ref type="bibr" target="#b15">[17]</ref>, organizations can identify and respond to threats in a timely manner, enhancing the security posture of their containerized applications and Cloud native infrastructures.</p><p>Current solutions can be used to enhance container security. The use cases are <ref type="bibr" target="#b8">[10]</ref>: (I) protecting a container from applications inside it, (II) inter-container protection, (III) protecting from containers, and (IV) protecting containers from a malicious host. Available solutions for the four use cases can be either(i) software solutions such as Linux namespaces, CGroups, capabilities, seccomp, and LSMs, or (ii) hardware solutions such as using vTPMs and utilizing trusted platform support.</p><p>Many researchers have similarly suggested that more studies are required to standardize the processes for deploying containers, defining communication protocols, and establishing assessment techniques. <ref type="bibr" target="#b15">[17,</ref><ref type="bibr" target="#b8">10]</ref>.Standards and frameworks should consider various factors such as platform-specific needs, application requirements, practical implementation, automation capabilities, simplicity, efficiency, and ease of integration.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Related work</head><p>This section reviews and explores some relevant tools for threat detection in the context of container runtime, as they share some similarities and objectives, although there are many commercial solutions available in the same area that are not covered in this paper. In recent years, containerization has revolutionized the deployment and management of applications, but it has also introduced security challenges <ref type="bibr" target="#b8">[10]</ref>. These include potential isolation breaches leading to privilege escalation, complexities in orchestrating secure configurations, and attacking private registry <ref type="bibr" target="#b8">[10,</ref><ref type="bibr" target="#b22">23]</ref>. To tackle container runtime security and threat detection within containerized environments, several techniques have been proposed, Container security encompasses several strategies and techniques. Dynamic Analysis Techniques (DAT) involve runtime monitoring of system activities, network traffic, and application behavior to identify anomalies and potential threats <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b24">25]</ref>. Container Orchestration and Management (COM), using platforms like Kubernetes, provide built-in monitoring and centralized visibility into containers' state, health, resource usage, and network interactions <ref type="bibr" target="#b2">[3]</ref>. Intrusion Detection Systems (IDS) monitor network traffic and system activities for malicious or unauthorized behavior, whether at the network level (NIDS) or within containers and hosts (HIDS) <ref type="bibr" target="#b25">[26,</ref><ref type="bibr" target="#b26">27,</ref><ref type="bibr" target="#b27">28]</ref>. Machine Learning for Threat Detection (MLTD) employs AI techniques to analyze data, detecting patterns and anomalies indicative of threats <ref type="bibr" target="#b28">[29,</ref><ref type="bibr" target="#b29">30]</ref>. Continuous Security Monitoring (CSM) integrates security throughout the container lifecycle, ensuring compliance from development to operation <ref type="bibr" target="#b15">[17]</ref>. Finally, Security by Design (SBD) incorporates runtime threat detection into the design phase, enabling early vulnerability identification and threat mitigation <ref type="bibr" target="#b30">[31]</ref>. These approaches collectively fortify container security, as supported by the cited references. The container runtime security landscape has witnessed significant innovation through the utilization of eBPF (Extended Berkeley Packet Filter) technology. Falco is an open-source threat detection engine that monitors the Linux kernel to detect anomalies in Kubernetes nodes and containers. Cilium Tetragon enhances container security with fine-grained network policies, while Elastic's CWP 2023 aims to protect Kubernetes containers holistically. Academic research by EL Khairi et al. focuses on system calls in containers to identify deviations that could signal malicious activities. While these solutions offer valuable approaches to container security, they face challenges such as performance overhead, complexity in policy management, and potential false positives and negatives. These limitations highlight the need for better visibility into containerized application behavior While the previous solutions offer innovative approaches to container security, they are not without their challenges and limitations. Real-time monitoring solutions like Falco, which operate at the kernel level, can introduce performance overhead, affecting the throughput and efficiency of the containers being monitored. With its focus on fine-grained network policies, Cilium Tetragon adds an element of complexity that could be challenging for teams without specialized knowledge. Furthermore, these tools often grapple with the issue of false positives and negatives, which could either raise unnecessary alarms or fail to detect subtle, sophisticated attacks. Elastic's CWP 2023, although Cloud native, may face similar performance and accuracy trade-offs, while academic research like that of EL Khairi et al. often necessitates validation in real-world scenarios to ascertain its practical applicability. Additionally, Tetragon's lack of alert generation may hinder threat identification. Complexity in policy configuration and enforcement can delay security deployment, and security tools may not cover all attack vectors <ref type="bibr" target="#b31">[32]</ref>. Addressing these limitations is crucial for a comprehensive security framework in the containerized application landscape. The proposed solution combines Cilium Tetragon and Elastic Stack for real-time threat detection, aiding SOC Analysts in identifying and alerting to malicious behavior in container runtimes <ref type="bibr" target="#b31">[32,</ref><ref type="bibr" target="#b32">33]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Methodology</head><p>This section aims to present the solution schema proposed. Figure <ref type="figure" target="#fig_0">1</ref> demonstrates how relevant data are collected from various sources to gain visibility into the investigated environment, including network traffic, filesystem events, and process execution using Cilium Tetragon. The data collection process is well defined to ensure a comprehensive scope; this means that all relevant data points and variables that are needed to answer research questions and data integrity ensure that the collected data are trustworthy, reliable, and suitable for analysis. Then the collected data are stored in Elasticsearch; a suitable platform capable of handling large amounts of data and providing efficient querying capabilities and detection rules. The major step before creating the detection rules is performing common transformations on the data before indexing following the elastic common scheme ECS to normalize the event data, which can better analyze, visualize and correlate the data represented in the events.</p><p>Due to the conditions and challenges in the container environment such as dynamic scaling, resource management, and network architecture. These are indeed critical considerations in the field of containerization and are recognized challenges in managing and securing containerized applications. Cilium Tetragon, a key component of the Cilium project focusing on enhancing network security in container environments, adeptly addresses various container conditions, including the intricacies of dynamic scaling. Tetragon excels in resource management through automatic scaling, adapting seamlessly to changes in container count within Kubernetes clusters. It ensures real-time visibility and monitoring, maintaining uninterrupted insights into network traffic and security events during dynamic scaling. Elasticsearch integration enables efficient data storage and retrieval. Tetragon enforces dynamic security policies, even as containers scale, and leverages eBPF technology for performance efficiency. Seamlessly integrated with Kubernetes, it offers continuous visibility and adaptive resource management.</p><p>The roadmap is divided into three phases:</p><p>• Data collection: This phase involves collecting data from various sources, such as container logs, network traffic, and filesystem activity. • Data normalization: This phase involves transforming the collected data into a format that can be easily analyzed. • Threat detection: This phase involves using techniques to identify patterns of behavior that are indicative of malicious activity. Figure <ref type="figure" target="#fig_0">1</ref> illustrates the solution roadmap</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Data Collection</head><p>Collecting data from the 4C's in a Cloud native application is essential for monitoring and understanding the security posture of the application, by collecting data from these 4C's, organizations can gain a better understanding of their Cloud native application. In this phase, relevant data will be collected from Cloud native applications, including network traffic, software and infrastructure logs, traces, and metrics from the environment and other relevant information.</p><p>In this phase, The system events are generated by a host kernel, by deploying a test application along with Tetragon in a Kubernetes cluster which is a Cloud native application. This will allow Tetragon to collect the system and container events running in the cluster, such as file access, network activity, system calls, and process execution. Tetragon also performs intelligent filtering and aggregation of events directly in the kernel, reducing the overhead and improving the efficiency of data collection. Furthermore, Tetragon supports real-time runtime enforcement of security policies across the operating system, preventing malicious or unwanted behaviors during container runtime run by the application itself or users with Kubernetes access permission.</p><p>A requirement for Tetragon's functionalities is that the system host kernel must support eBPF technologies. The collected logs are saved under Tetragon's specific container, and the next step is to use it as a dataset for future analysis and visualizations to perform the Threat Detection Solution using search and analysis platforms such as the Elastic Stack for further treatment and normalization.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Data Normalisation</head><p>The normalization process consists of several procedures, such as Stored Data Recovery, Data Indexing, and Visualization for Analysis. Each procedure employs its appropriate solution and tools (Elastic stack in this case) to complete the normalization phase. Stored Data Recovery: The data collection produced log files that were stored within Tetragon containers in the Kubernetes environment. A bridge will be established between the Kubernetes environment and the host system using Elastic Stack solutions such as Elastic Agent. This agent will hook inside the Kubernetes node where the log files are saved during the containers' runtime and communicate with Elasticsearch to create and store a copy of these logs for further procedures using an elastic agent. Indexing and Visualization: After creating copies of the log files, Elasticsearch will index these logs and display their contents on Kibana graphical interface provided by Elastic Stack with data views following standard Mappings. Each mapping provides unique fields for each log data. After the visualization, we identify the message field that contains the logs provided by Tetragon to analyze the fields and values in this message.</p><p>As a result of the previous procedures, the data is indexed and ready for normalization. The normalization phase requires specific mappings and pipelines to extract important information from Tetragon's message. These pipelines are based on Elastic Common Schemas, using processors and conditions provided by Elasticsearch to reduce the complexity of the collected logs and make them in a readable format. The ingest pipeline consists of a series of configurable tasks called processors. Each processor runs sequentially, making specific changes to our incoming documents. After the processors have run, Elasticsearch adds the transformed documents to the data stream.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Threat Detection</head><p>This phase is the most essential phase, it involves the application of detection rules that are developed based on the scenarios discussed in section 5. These rules are enabled by the data normalization phase, which provides a consistent and reliable foundation for data analysis. The Detection Engine component of Elasticsearch uses these rules to examine the indexed data and generate alerts for any anomalous or malicious behavior.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Results and experiments</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Deploy Kubernetes Goat</head><p>Starting by deploying Kubernetes Goat which is a learning platform that offers more than 20 realistic scenarios. These scenarios include attacks, defenses, best practices, tools, and others. Table <ref type="table">5</ref> shows some scenarios offered by Kubernetes Goat and how each scenario is categorized according to its security. Once the Kubernetes GOAT is deployed and attacking scenarios are explored, it proceeds to the next step, which is data collection. Securing Kubernetes Clusters using Kyverno Policy Engine.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>Kubernetes Goat app scenarios and categories <ref type="bibr" target="#b33">[34]</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Data Collection</head><p>After deploying Tetragon, the initial step involves rolling it out and then activating the feature that allows the modifications of capability and namespace through the config map. This can be accomplished by updating the values of "enable process-cred" and "enable-process-ns" from "false" to "true." The File Access tracing policies can be activated by applying a YAML configuration file. This file specifies a tracing policy for the CNI cilium (Container Network Interface) plugin, which is used by Kubernetes. The tracing policy enables to monitor the system calls executed by the processes running on a node within the Kubernetes cluster. The policy specifies four kprobes that will be used to trace events related to file operations. The network observability tracing policies can also be activated by applying a YAML file that defines a Cilium TracingPolicy for network connections. This policy indicates certain kprobes that will be employed to trace events related to TCP connections.</p><p>A YAML file defines a Cilium tracing policy for network connections. The policy specifies three kprobes that will be used to trace events related to TCP connections. The kprobes are:</p><p>• tcp_connect which is triggered when a TCP connection is established. The first argument of this kprobe is a sock structure that contains information about the connection. • tcp_close which is triggered when a TCP connection is closed. The first argument of this kprobe is also a sock structure that contains information about the connection. • tcp_sendmsg which is triggered when a TCP message is sent. The first argument of this kprobe is a sock structure that contains information about the connection. The second argument is an integer that represents the length of the message.</p><p>To locate the stored logs from Tetragon, access to the cluster files is required. This involves finding the Docker container that hosts this cluster. After finding the container that hosts the cluster files, the following steps involve installing the Elastic Agent and configuring the Fleet server. These steps enable the integration and management of the Elastic Agent within the cluster. The Elastic Agent is a lightweight data shipper that collects and forwards logs and metrics to the Fleet server for centralized management and analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Custom Logs Integration Configuration</head><p>By adding Custom Logs to the Fleet Server Policy, The path from which Elastic-Agent should retrieve the data that can be specified easily. In this case, the path is used from the cluster files.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Check Index Data in Elastic</head><p>Running several containerized processes for multiple days, allowing Tetragon to capture their logs. Elastic agent should retrieve these logs continuously without any disruption. The logs are then indexed by Elasticsearch and displayed on Kibana's dashboards as a data view.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Analyse Message Field</head><p>The objective is to visually analyze the message field, which contains Tetragon-generated logs in JSON format. These logs contain a variety of fields and values related to container-to-host kernel processes and events. The main aim of this analysis is to enhance the data by adding new fields following the Elastic Common Schema (ECS) to standardize and normalize it. This involves extracting field names and their expected value formats from the messages.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Create and Configure Pipeline</head><p>Extracting pertinent details from Tetragon's message fields and content involves employing specialized processors to convert Tetragon logs into a human-readable format. This process is facilitated through a designated pipeline called "logs-tetra-default, " where suitable processors are chosen for each field and data type or format to attain the intended outcomes. Additionally, normalizing log files with Elastic Common Schema (ECS) necessitates the incorporation of mandatory ECS fields like "Event. Type" and "Event.Category." While Tetragon logs may not inherently produce these fields, they can be derived from certain log values following a comprehensive analysis.</p><p>To apply the pipeline to the current data stream, the Custom logs integration for the Fleet server policy is configured Table <ref type="table" target="#tab_3">3</ref>   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Threat Detection</head><p>Before configuring detection rules, test Kubernetes Goat App's attack capabilities on scenarios like container escape and namespace bypass, as outlined in Section 5. One scenario demonstrates detecting privilege escalation attacks using Tetragon, where a container escape leads to host system access. The process involves accessing the system-monitor pod with a specific command, then exploiting it with "nsenter. " Another critical scenario involves attacking the private registry, explained in Section 5. This entails executing a set of commands to obtain the 'k8s-goat-FLAG' flag value in private registry images. These commands allow exploration and retrieval of container image information, including registry details, image catalog, manifests, and specific properties like environment variables, essential for Docker and container management tasks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Create Detection Rules</head><p>By exploiting the attacks in the previous task, rules for the detection of these attacks were created using Kibana's ability to form various types of rules such as queries using KQL and EQL. The source of the data that the rule should apply to (logs-generic-*) was defined, along with the query in the chosen query language, and details about the rule such as severity and risk score. A schedule was then added to the rule to run at specific time intervals, along with an action to be taken when an attack is detected, such as sending alerts.</p><p>For each scenario selection in the previous task, a detection rule was created. The detection query for the "Container escape to the host" attack is written in EQL. The detection query for the container private registry attack is written in KQL.</p><p>e v e n t . c a t e g o r y : " p r o c e s s " and p r o c e s s . e x e c u t a b l e : " / b i n / r e g i s t r y " and p r o c e s s . a r g s : " e x e c v e " This query is looking for events where the category is "process", the executable involved is "/bin/registry", and one of the arguments in the process is "execve", which is a system call in Unix-like operating systems that replaces the current process image with a new one.</p><p>After each detection, an alert will be created and displayed in Kibana which provides several ways of alerting for an improved alerting system. The upcoming task will implement the configuration of these alerts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Configure and test Alerts</head><p>Kibana's email connector is selected for our alerting system, allowing the generation of email alerts when specific conditions are met. Configuration includes sender information and rule settings, including recipient and message content. Testing involves triggering attacks to verify the alert function. Subsequently, swift action is taken to address and mitigate security incidents.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Discussion</head><p>Our proposal stands as a comprehensive solution aimed at solving the challenge of enhancing threat detection capabilities within containerized environments. By promoting a powerful interaction between visibility tools and log analysis processes, our approach empowers Security Operations Center (SOC) Analysts. It enables them to efficiently identify and respond to threats or malicious activities, ensuring a robust defense against intrusion in real time within the container runtime environment.</p><p>The findings of this study clearly show that the integration of Cilium Tetragon and Elastic Stack significantly enhances the threat detection capabilities within containerized systems. By employing readable forms for writing detection rules, this study contributes to the improvement of runtime security in Cloud native environment. Simplifying log analysis enables SOC analysts to readily identify abnormal or malicious activities.</p><p>One explanation for the success of this approach could be the combination of powerful visibility tools and simplified log analysis techniques, which augment the traditional capabilities of SOC analysts. This integration enables not only real-time monitoring but also proactive threat mitigation, addressing the limitations posed by traditional security measures in Cloud native environments. This study takes a strong position that an integrated approach, as suggested, is crucial for improving the runtime security of Cloud native environments.</p><p>Therefore, in the current landscape where security threats evolve at an unprecedented pace, implementing a solution that provides real-time visibility and actionable insights has become an imperative, not just an option. This study, while providing a foundational approach to runtime security, had its limitations in terms of its focus on specific tools-namely Cilium Tetragon and Elastic Stack. it explored how the integration of these specific tools can be leveraged to strengthen the security measures in Cloud native environments. Although these tools were effective for the purposes of this study, it's worth noting that the ever-evolving cybersecurity landscape necessitates continuous research and adaptation. Therefore, the study serves as a starting point for future research.</p><p>Future research could explore alternative tool combinations and metrics for comparing threat detection strategies. Long-term monitoring would provide insights into the solution's adaptability. As Cloud-native architectures evolve, our security approach must adapt too. This study enhances threat detection, equipping security professionals for timely action, and serves as a foundational improvement in runtime security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusion</head><p>The growing adoption of Cloud native architectures offers efficiency and scalability but presents security challenges. This paper presents a case study for robust security in Cloud-native environments, integrating Cilium Tetragon and Elastic Stack for real-time threat detection. It serves as a proof of concept for future container runtime security research. Traditional security approaches in Cloud-native settings are inadequate, so we aim to enhance threat detection. Future work includes expanding our resource index for network and endpoint visibility and deploying machine learning for unknown threat detection.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Solution Roadmap.</figDesc><graphic coords="7,89.29,84.19,416.67,238.73" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>p r o c e s s where p r o c e s s . a r g s == " e x e c v e r o o t c w d c l o n e " and p r o c e s s . p a r e n t . e x e c u t a b l e == " / u s r / l o c a l / s b i n / r u n c " and p r o c e s s . p a r e n t . a r g s == " e x e c v e c l o n e " and ( p r o c e s s . e x e c u t a b l e == " / b i n / sh " or p r o c e s s . e x e c u t a b l e == " / b i n / b a s h " )</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>The 4C's of Cloud Native Security</figDesc><table><row><cell>Cloud</cell></row><row><cell>Cluster</cell></row><row><cell>Container</cell></row><row><cell>Code</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>lists the required processors for the normalization process:</figDesc><table><row><cell cols="2">Processor Value</cell></row><row><cell>Dissect</cell><cell>Splits a field into multiple fields using a delimiter.</cell></row><row><cell>JSON</cell><cell>Parses a JSON string and adds it as a new object field.</cell></row><row><cell>Rename</cell><cell>Renames an existing field to a new name.</cell></row><row><cell>Split</cell><cell>Splits a field into an array using a separator character.</cell></row><row><cell>Set</cell><cell>Sets the value of a field to a predefined value.</cell></row><row><cell>Script</cell><cell>Executes a script to modify documents before indexing.</cell></row><row><cell>Remove</cell><cell>Removes one or more fields from the document.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 3</head><label>3</label><figDesc>Used Processors in the pipeline.After applying the normalization pipeline, a powerful feature in Kibana called Data Quality is utilized to analyze the data view field types and compare them to the expected values and data types of the Elastic Common Schema. Any incorrect value indicates the need for pipeline maintenance or additional mapping if necessary. Results show the total number of fields available, the number of fields that are compliant with ECS (Elastic Common Schema), and The number of fields that have been customized. Using Data Quality in Kibana helps ensure data accuracy and consistency, identifying any discrepancies in the field types and assisting in maintaining a well-structured and standardized data representation.</figDesc><table><row><cell>Check Data Quality</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgment</head><p>We would like to express our sincere gratitude to all individuals and the Octodet team who have contributed to the completion of this project. Their support, guidance, and assistance have been invaluable. This work was partially supported by the LABEX-TA project MeFoGL: "Méthode Formelles pour le Génie Logiciel"</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Scholl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Swanson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Jausovec</surname></persName>
		</author>
		<title level="m">Cloud Native: Using Containers, Functions, and Data to Build Next-Generation Applications</title>
				<imprint>
			<publisher>O&apos;Reilly Media, Inc</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ammi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Adedugbe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Alharby</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Benkhelifa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cluster Computing</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="3629" to="3640" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Casalicchio</surname></persName>
		</author>
		<title level="m">Container orchestration: A survey, Systems Modeling: Methodologies and Tools</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="221" to="235" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">The 4c&apos;s of cloud native security</title>
		<ptr target="https://www.linkedin.com/pulse/4cs-Cloud-native-security-tl-consulting-group/" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Luksa</surname></persName>
		</author>
		<title level="m">Kubernetes in action</title>
				<imprint>
			<publisher>Simon and Schuster</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Vettor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Smith</surname></persName>
		</author>
		<title level="m">Architecting cloud-native .net apps for azure</title>
				<meeting><address><addrLine>Washington</addrLine></address></meeting>
		<imprint>
			<publisher>Microsoft Corporation</publisher>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Evaluation of docker containers based on hardware utilization</title>
		<author>
			<persName><forename type="first">E</forename><surname>Preeth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J P</forename><surname>Mulerickal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Paul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Sastri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2015 international conference on control communication &amp; computing India (ICCC), IEEE</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="697" to="700" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">The road to docker: a survey</title>
		<author>
			<persName><forename type="first">G</forename><surname>Bhatia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Choudhary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gupta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Advanced Research in Computer Science</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="83" to="87" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Container security: Issues, challenges, and the road ahead</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sultan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Ahmad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Dimitriou</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2019.2911732</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="52976" to="52996" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Casalicchio</surname></persName>
		</author>
		<title level="m">Container orchestration: A survey, Systems Modeling: Methodologies and Tools</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="221" to="235" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">What are ci/cd and the ci/cd pipeline?</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">C</forename><surname>Education</surname></persName>
		</author>
		<ptr target="https://www.ibm.com/blog/ci-cd-pipeline/" />
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<ptr target="https://glossary.cncf.io/serverless/" />
		<title level="m">Serverless cncf glossary</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Overview of cloud native security</title>
		<author>
			<persName><forename type="first">C</forename><surname>Native</surname></persName>
		</author>
		<ptr target="https://kubernetes.io/docs/concepts/security/overview/" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Sosinsky</surname></persName>
		</author>
		<title level="m">Cloud computing bible</title>
				<imprint>
			<publisher>John Wiley &amp; Sons</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">762</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A review of native container security for running applications</title>
		<author>
			<persName><forename type="first">O</forename><surname>Flauzac</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Mauhourat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Nolot</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">175</biblScope>
			<biblScope unit="page" from="157" to="164" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Towards improving container security by preventing runtime escapes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Reeves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Tian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bianchi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">B</forename><surname>Celik</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="38" to="46" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">7 key features for kubernetes and container security</title>
		<author>
			<persName><forename type="first">G</forename><surname>Pai</surname></persName>
		</author>
		<ptr target="https://www.infoworld.com/article/3699109/" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m">-key-features-for-kubernetes-and-container-security</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Runtime security monitoring with ebpf</title>
		<author>
			<persName><forename type="first">G</forename><surname>Fournier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Afchain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Baubeau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">17th SSTIC Symposium sur la Sécurité des Technologies de l&apos;Information et de la Communication</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">The rise of ebpf for non-intrusive performance monitoring</title>
		<author>
			<persName><forename type="first">C</forename><surname>Cassagnes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Trestioreanu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Joly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>State</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Linux Observability with BPF: Advanced Programming for Performance Analysis and Networking</title>
		<author>
			<persName><forename type="first">D</forename><surname>Calavera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Fontana</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2019">2019</date>
			<publisher>O&apos;Reilly Media</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">N</forename><surname>Al-Mhiqani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ahmad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Abidin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Yassin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hassan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">H</forename><surname>Abdulkareem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">S</forename><surname>Ali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Yunos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Sciences</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">5208</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A measurement study on linux container security: Attacks and countermeasures</title>
		<author>
			<persName><forename type="first">X</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Lei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Jing</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 34th Annual Computer Security Applications Conference</title>
				<meeting>the 34th Annual Computer Security Applications Conference</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="418" to="429" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Dynamic analysis of inefficiently-used containers</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rountev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Ninth International Workshop on Dynamic Analysis</title>
				<meeting>the Ninth International Workshop on Dynamic Analysis</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="30" to="35" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Hardening containers with static and dynamic analysis</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">R K</forename><surname>Patil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>John</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Kunja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dwivedi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Suganthi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Honnnavali</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science</title>
				<meeting>the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science<address><addrLine>Wales</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022-06">2022. June. 2023</date>
			<biblScope unit="page" from="207" to="227" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Intrusion detection: A survey</title>
		<author>
			<persName><forename type="first">F</forename><surname>Sabahi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Movaghar</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICSNC.2008.44</idno>
	</analytic>
	<monogr>
		<title level="m">Third International Conference on Systems and Networks Communications</title>
				<imprint>
			<date type="published" when="2008">2008. 2008</date>
			<biblScope unit="page" from="23" to="26" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Explainable intrusion detection systems (x-ids): A survey of current methods, challenges, and opportunities</title>
		<author>
			<persName><forename type="first">S</forename><surname>Neupane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ables</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Anderson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mittal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rahimi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Banicescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Seale</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="112392" to="112415" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Thakkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Lohiya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence Review</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="page" from="453" to="563" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">A study on container vulnerability exploit detection</title>
		<author>
			<persName><forename type="first">O</forename><surname>Tunde-Onadele</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Dai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Gu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2019 ieee international conference on Cloud engineering (IC2E), IEEE</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="121" to="127" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">A comprehensive review of ai applications in automated container orchestration, predictive maintenance, security and compliance, resource optimization, and continuous deployment and testing</title>
		<author>
			<persName><forename type="first">V</forename><surname>Bandari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Intelligent Automation and Computing</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="1" to="19" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">Advanced sciences and technologies for security applications security by design innovative perspectives on complex problems</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J M</forename><surname>Editor</surname></persName>
		</author>
		<ptr target="http://www.springer.com/series/5540" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<ptr target="https://isovalent.com/tetragon/" />
		<title level="m">Cilium tetragon</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<title level="m" type="main">Container workload protection | elastic security solution</title>
		<ptr target="https://www.elastic.co/guide/en/security/master/d4c-overview.html" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<ptr target="https://madhuakula.com/kubernetes-goat/docs/scenarios" />
		<title level="m">Kubernetes goat scenarios</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
