ÐбнаÑÑжение вÑедоноÑной акÑивноÑÑи в конвейеÑÐ°Ñ CI/CD Ñ Ð¸ÑполÑзованием ÑÐµÑ Ð½Ð¾Ð»Ð¾Ð³Ð¸Ð¸ eBPF: вÑпÑÑÐºÐ½Ð°Ñ ÐºÐ²Ð°Ð»Ð¸ÑикаÑÐ¸Ð¾Ð½Ð½Ð°Ñ ÑабоÑа ÑпеÑиалиÑÑа
Gespeichert in:
| Titel: | ÐбнаÑÑжение вÑедоноÑной акÑивноÑÑи в конвейеÑÐ°Ñ CI/CD Ñ Ð¸ÑполÑзованием ÑÐµÑ Ð½Ð¾Ð»Ð¾Ð³Ð¸Ð¸ eBPF: вÑпÑÑÐºÐ½Ð°Ñ ÐºÐ²Ð°Ð»Ð¸ÑикаÑÐ¸Ð¾Ð½Ð½Ð°Ñ ÑабоÑа ÑпеÑиалиÑÑа |
|---|---|
| Verlagsinformationen: | СанкÑ-ÐеÑеÑбÑÑгÑкий полиÑÐµÑ Ð½Ð¸ÑеÑкий ÑнивеÑÑиÑÐµÑ ÐеÑÑа Ðеликого, 2025. |
| Publikationsjahr: | 2025 |
| Schlagwörter: | вÑедоноÑÐ½Ð°Ñ Ð°ÐºÑивноÑÑÑ, ÑиÑÑемнÑе вÑзовÑ, malicious activity, конвейеÑÑ ci/cd, конÑейнеÑнÑе ÑиÑÑемÑ, syscalls, ci/cd pipelines, container systems, обнаÑÑжение аномалий, ebpf, devsecops, anomaly detection |
| Beschreibung: | ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение вÑедоноÑной акÑивноÑÑи в конвейеÑаÑ
CI/CD на оÑнове даннÑÑ
, полÑÑаемÑÑ
Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑеÑ
нологии eBPF. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ ÑовÑеменнÑе подÑ
Ð¾Ð´Ñ Ðº вÑÑÐ²Ð»ÐµÐ½Ð¸Ñ Ð°Ñак и аномалий, пÑоиÑÑ
одÑÑиÑ
во вÑÐµÐ¼Ñ Ð²ÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ð²ÐµÐ¹ÐµÑа CI/CD. ÐадаÑи, ÑеÑаемÑе в Ñ
оде иÑÑледованиÑ: 1. ÐпÑеделиÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑи наÑÑÑиÑÐµÐ»Ñ Ð¸ акÑÑалÑнÑе ÑгÑÐ¾Ð·Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи Ð´Ð»Ñ ÐºÐ¾Ð½Ð²ÐµÐ¹ÐµÑов CI/CD. 2. ÐÑÑвиÑÑ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ ÑÑедÑÑв заÑиÑÑ ÐºÐ¾Ð½Ð²ÐµÐ¹ÐµÑов CI/CD и пеÑÑпекÑивнÑе подÑ
Ð¾Ð´Ñ Ðº обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð²ÑедоноÑной акÑивноÑÑи. 3. ÐÑедложиÑÑ ÑпоÑоб обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð²ÑедоноÑной акÑивноÑÑи в конвейеÑаÑ
CI/CD Ñ Ð¸ÑполÑзованием ÑеÑ
нологии eBPF и поведенÑеÑкого анализа. 4. РеализоваÑÑ Ð¿ÑогÑаммнÑй пÑоÑоÑип и пÑовеÑÑи ÑкÑпеÑименÑалÑнÑÑ Ð¿ÑовеÑÐºÑ Ð¿Ñедложенного ÑпоÑоба. Ð Ñ
оде ÑабоÑÑ Ð±Ñла иÑÑледована ÑиÑÑÐµÐ¼Ñ ÑбоÑки конвейеÑов CI/CD, показана взаимозаменÑемоÑÑÑ ÑиÑÑем. ÐÑÐµÐ´Ð»Ð¾Ð¶ÐµÐ½Ñ ÑÐ¸Ð¿Ñ Ð½Ð°ÑÑÑиÑÐµÐ»Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи в конвейеÑе CI/CD, ÑоÑÑавлен ÑпиÑок акÑÑалÑнÑÑ
ÑгÑоз. ÐпÑÐµÐ´ÐµÐ»ÐµÐ½Ñ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ ÑÑедÑÑв заÑиÑÑ ÐºÐ¾Ð½Ð²ÐµÐ¹ÐµÑов. Ð ÐµÐ°Ð»Ð¸Ð·Ð¾Ð²Ð°Ð½Ñ Ð°Ñаки на конвейеÑ, ÑобÑан Ð½Ð°Ð±Ð¾Ñ Ð´Ð°Ð½Ð½ÑÑ
Ð´Ð»Ñ ÑеÑÑиÑованиÑ. Ð ÑезÑлÑÑаÑе ÑабоÑÑ Ð¿Ñедложен комбиниÑованнÑй ÑпоÑоб обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð¿Ð¾ÑенÑиалÑно вÑедоноÑной акÑивноÑÑи в конвейеÑаÑ
. ÐкÑпеÑименÑалÑно пÑодемонÑÑÑиÑована ÑоÑноÑÑÑ Ð¸ ÑабоÑоÑпоÑобноÑÑÑ ÑпоÑоба. ÐолÑÑеннÑе ÑезÑлÑÑаÑÑ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ Ð¸ÑполÑÐ·Ð¾Ð²Ð°Ð½Ñ Ð´Ð»Ñ Ð²Ð½ÐµÐ´ÑÐµÐ½Ð¸Ñ Ð² ÑÑедÑÑва заÑиÑÑ ÑбоÑÑиков и иÑÑледований в облаÑÑи безопаÑноÑÑи конвейеÑов. The purpose of the study is to detect malicious activity in CI/CD pipelines using data collected through eBPF. The subject of the work is modern approaches to detecting attacks and anomalies that occur during the execution of a CI/CD pipeline. The research sets the following goals: 1. Identify the intruders capabilities and current security threats for CI/CD pipelines. 2. Identify limitations of CI/CD pipeline protection tools and explore approaches to detecting malicious activity. 3. Development of a way to detect malicious activity in CI/CD pipelines using eBPF technology and behavioral analysis. 4. Implement a software prototype and conduct experimental testing of the proposed method. During the work CI/CD systems were investigated and the interchangeability of these systems was demonstrated. Types of security threats in the CI/CD pipeline were proposed, and a list of current threats was compiled. The limitations of existing protection tools were identified. Attacks on the pipeline were simulated, and a set of data was collected for testing purposes kernel network stack implementation and architecture were studied. The work resulted in the development of combined way for detecting potentially malicious activity in pipelines was proposed. The accuracy and operability of the way have been experimentally demonstrated. These results can be used to implement protection tools for CI systems and contribute to research in CI/CD pipelines security. |
| Publikationsart: | Other literature type |
| Sprache: | Russian |
| DOI: | 10.18720/spbpu/3/2025/vr/vr25-43 |
| Dokumentencode: | edsair.doi...........cdae2212769c93bd7dc40ca46c0d4090 |
| Datenbank: | OpenAIRE |
| Abstract: | ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение вÑедоноÑной акÑивноÑÑи в конвейеÑÐ°Ñ CI/CD на оÑнове даннÑÑ , полÑÑаемÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑÐµÑ Ð½Ð¾Ð»Ð¾Ð³Ð¸Ð¸ eBPF. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ ÑовÑеменнÑе Ð¿Ð¾Ð´Ñ Ð¾Ð´Ñ Ðº вÑÑÐ²Ð»ÐµÐ½Ð¸Ñ Ð°Ñак и аномалий, пÑоиÑÑ Ð¾Ð´ÑÑÐ¸Ñ Ð²Ð¾ вÑÐµÐ¼Ñ Ð²ÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ð²ÐµÐ¹ÐµÑа CI/CD. ÐадаÑи, ÑеÑаемÑе в Ñ Ð¾Ð´Ðµ иÑÑледованиÑ: 1. ÐпÑеделиÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑи наÑÑÑиÑÐµÐ»Ñ Ð¸ акÑÑалÑнÑе ÑгÑÐ¾Ð·Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи Ð´Ð»Ñ ÐºÐ¾Ð½Ð²ÐµÐ¹ÐµÑов CI/CD. 2. ÐÑÑвиÑÑ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ ÑÑедÑÑв заÑиÑÑ ÐºÐ¾Ð½Ð²ÐµÐ¹ÐµÑов CI/CD и пеÑÑпекÑивнÑе Ð¿Ð¾Ð´Ñ Ð¾Ð´Ñ Ðº обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð²ÑедоноÑной акÑивноÑÑи. 3. ÐÑедложиÑÑ ÑпоÑоб обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð²ÑедоноÑной акÑивноÑÑи в конвейеÑÐ°Ñ CI/CD Ñ Ð¸ÑполÑзованием ÑÐµÑ Ð½Ð¾Ð»Ð¾Ð³Ð¸Ð¸ eBPF и поведенÑеÑкого анализа. 4. РеализоваÑÑ Ð¿ÑогÑаммнÑй пÑоÑоÑип и пÑовеÑÑи ÑкÑпеÑименÑалÑнÑÑ Ð¿ÑовеÑÐºÑ Ð¿Ñедложенного ÑпоÑоба. Ð Ñ Ð¾Ð´Ðµ ÑабоÑÑ Ð±Ñла иÑÑледована ÑиÑÑÐµÐ¼Ñ ÑбоÑки конвейеÑов CI/CD, показана взаимозаменÑемоÑÑÑ ÑиÑÑем. ÐÑÐµÐ´Ð»Ð¾Ð¶ÐµÐ½Ñ ÑÐ¸Ð¿Ñ Ð½Ð°ÑÑÑиÑÐµÐ»Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи в конвейеÑе CI/CD, ÑоÑÑавлен ÑпиÑок акÑÑалÑнÑÑ ÑгÑоз. ÐпÑÐµÐ´ÐµÐ»ÐµÐ½Ñ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ ÑÑедÑÑв заÑиÑÑ ÐºÐ¾Ð½Ð²ÐµÐ¹ÐµÑов. Ð ÐµÐ°Ð»Ð¸Ð·Ð¾Ð²Ð°Ð½Ñ Ð°Ñаки на конвейеÑ, ÑобÑан Ð½Ð°Ð±Ð¾Ñ Ð´Ð°Ð½Ð½ÑÑ Ð´Ð»Ñ ÑеÑÑиÑованиÑ. Ð ÑезÑлÑÑаÑе ÑабоÑÑ Ð¿Ñедложен комбиниÑованнÑй ÑпоÑоб обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð¿Ð¾ÑенÑиалÑно вÑедоноÑной акÑивноÑÑи в конвейеÑÐ°Ñ . ÐкÑпеÑименÑалÑно пÑодемонÑÑÑиÑована ÑоÑноÑÑÑ Ð¸ ÑабоÑоÑпоÑобноÑÑÑ ÑпоÑоба. ÐолÑÑеннÑе ÑезÑлÑÑаÑÑ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ Ð¸ÑполÑÐ·Ð¾Ð²Ð°Ð½Ñ Ð´Ð»Ñ Ð²Ð½ÐµÐ´ÑÐµÐ½Ð¸Ñ Ð² ÑÑедÑÑва заÑиÑÑ ÑбоÑÑиков и иÑÑледований в облаÑÑи безопаÑноÑÑи конвейеÑов.<br />The purpose of the study is to detect malicious activity in CI/CD pipelines using data collected through eBPF. The subject of the work is modern approaches to detecting attacks and anomalies that occur during the execution of a CI/CD pipeline. The research sets the following goals: 1. Identify the intruders capabilities and current security threats for CI/CD pipelines. 2. Identify limitations of CI/CD pipeline protection tools and explore approaches to detecting malicious activity. 3. Development of a way to detect malicious activity in CI/CD pipelines using eBPF technology and behavioral analysis. 4. Implement a software prototype and conduct experimental testing of the proposed method. During the work CI/CD systems were investigated and the interchangeability of these systems was demonstrated. Types of security threats in the CI/CD pipeline were proposed, and a list of current threats was compiled. The limitations of existing protection tools were identified. Attacks on the pipeline were simulated, and a set of data was collected for testing purposes kernel network stack implementation and architecture were studied. The work resulted in the development of combined way for detecting potentially malicious activity in pipelines was proposed. The accuracy and operability of the way have been experimentally demonstrated. These results can be used to implement protection tools for CI systems and contribute to research in CI/CD pipelines security. |
|---|---|
| DOI: | 10.18720/spbpu/3/2025/vr/vr25-43 |
Nájsť tento článok vo Web of Science