Skip to content

Asbatel/Procatch

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

Procatch

Platform Language

This repository contains the code for the paper:

Procatch: Detecting Execution-based Anomalies in Single-Instance Microservices
Asbat El Khairi, Andreas Peter, Andrea Continella
University of Twente, University of Oldenburg
To appear at [IEEE Conference on Communications and Network Security], 2025


Overview

Procatch is a novel approach to container anomaly detection that requires no training. It builds on the inherently bounded nature of microservices (i.e., each designed to perform a narrow, single task) to quickly and reliably detect unexpected behavior.

Requirements

  • Falco must be installed
  • kubectl and crictl must be available on the system

Note:
This script is designed for a single-node Kubeadm Kubernetes cluster using the containerd runtime.
In other environments—such as GKE or setups where the control plane is not accessible from worker nodes—the script must be executed on the worker node where the target pod is running. You might retrieve pod information externally using the Kubernetes API server, or modify the script to accept the container name or ID as input, which you can obtain using commands such as crictl ps.

Usage

1. Baseline

./baseline.sh <namespace> <pod-name> 

2. Falco Rules

./generate_falco_rule.sh <pod_baseline.json> 

3. Monitor

falco -r <pod_falco_rule.yaml> 

About

Procatch: Detecting Execution-based Anomalies in Single-Instance Microservices - IEEE CNS'25

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages