From the course: Kubernetes Threat and Attack Detection by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Understanding syscall behavioral analysis

Understanding syscall behavioral analysis - Kubernetes Tutorial

From the course: Kubernetes Threat and Attack Detection by Pearson

Understanding syscall behavioral analysis

What is behavioral analysis? The concept of behavioral analysis comes down to a process. And this process's entire purpose is to watch the different events or actions that are happening within your environment to determine if those different actions or events are potentially malicious or if they're benign. Now, ultimately, there are a number of tools you can use for this. S-Trace is one that's available within practically every Linux platform that's out there. You've got Falco, Tracy, Tetragon. All these are examples of some really sophisticated tools that you can use to be able to take a look at what's happening at the process or syscall level. Because ultimately, that's going to be the best indication as to what's happening within your pod or container environment. Now, these various tools, we're going to focus on specifically Strace, and Falco, because those are the ones you're most likely to see on the exam. Now, when it comes to Linux syscall, we've seen this before. The idea is…

Contents