ODR kommer att vara otillgängligt pga systemunderhåll onsdag 25 februari, 13:00 -15:00 (ca). Var vänlig och logga ut i god tid. // ODR will be unavailable due to system maintenance, Wednesday February 25, 13:00 - 15:00. Please log out in due time.
 

Designing a Proactive Security Solution for Kubernetes Clusters

Publicerad

Typ

Examensarbete för masterexamen
Master's Thesis

Modellbyggare

Tidskriftstitel

ISSN

Volymtitel

Utgivare

Sammanfattning

Kubernetes cloud environments often contain security vulnerabilities exploitable during runtime, but undetected by the scanning tools widely used during build or deployment phases, due to the distributed and dynamic nature of containerized applications. Traditional reactive security approaches for detecting runtime exploits usually depend on manual intervention, causing delayed responses and unnecessary service disruptions because of false positives. This thesis develops and evaluates a proactive security solution for Kubernetes clusters, with particular focus on 5G core network environments. The proposed solution integrates multi-step attack detection with automated mitigation strategies to improve detection accuracy and response time. Using a labeled dataset of Falco alerts generated within a 5G core network by the ACE-WARP project, five statistical and machine learning models are developed and evaluated: Markov Chain, Hidden Markov Model, Long Short-Term Memory (LSTM), Convolutional Neural Network (CNN), and Bayesian Network. With each model, the likelihood of an attack sequence belonging to the normal or attack distributions is used for the binary classification task of identifying sequences containing attacks. All models are evaluated with both balanced (1:1) and imbalanced (1:50) class ratios. The LSTM and CNN models achieve the highest detection rate of 84.3 percent and the lowest false alarm rate of 0.02 percent under imbalanced settings. They maintain strong precision (average precision of 99.2 percent) and area under the curve (AUC-ROC of 96.2 percent), outperforming the baseline Markov Chain, other models, and prior work. Beyond identifying the best-performing models, this thesis also proposes mitigation techniques such as pod deletion for immediate isolation of threats and sandboxing for forensic analysis. These components form a complete security solution designed as a containerized microservice using Docker and exposed through a RESTful API, that can be applied to large Kubernetes clusters. Therefore, this design supports scalability, modularity, and compatibility requirements with industrial 5G core network deployments.

Beskrivning

Ämne/nyckelord

Kubernetes security solution, multi-step attack detection, attack mitigation

Citation

Arkitekt (konstruktör)

Geografisk plats

Byggnad (typ)

Byggår

Modelltyp

Skala

Teknik / material

Index

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced