Skip to content

Latest commit

 

History

History
68 lines (39 loc) · 1.85 KB

README.md

File metadata and controls

68 lines (39 loc) · 1.85 KB

Menga

When we download a docker image, and run it as a container, we have no guarantee on its malicious behavior or not. Indeed, docker images are regularly uploaded on public repositories open to everyone. So, an attacker can publish a malicious docker image on a public repository. This image could then be downloaded by a developer or an ops and executed on his infrastructure.

Menga is an application that aims to analyze the behavior of docker containers running on a given infrastructure with the objective of detecting potentially malicious behavior of these containers:

- Illegal or unsolicited network traffic

- Suspicious CPU consumption (crypto-mining)

- Suspicious kernel calls

The project is based on ebpf technology which allows for a wide variety of hook and probe functionality.

V1

Menga logo

Based on probes of https://github.com/iovisor/bcc

Dependencies

 pip3 install bcc, python-docx, cairosvg, Elasticsearch, docker

Cmd Line

Time Based Mode

 sudo python3 menga.py -dt 30 -o result.csv -i alpinetest

Real Time Mode

 sudo python3 menga.py -rt -o result.csv -i alpinetest -u elastic -p changeMe -ip localhost -id menga-network

Menga global architecture

UI

Menga ui

ElasticSearch

Menga kibana dashboard

Contributions

Any help is welcome, feel free to clone and pull request us your modifications.

In case you want to add your sensors it is possible to do so by implementing the Sensor interface and calling it in the sensor_launch.py

Improvements

  • Analyse data to make correlation
  • Finish to implements all the sensors in ui
  • Rewrite Sensors in RedBPF to allow more flexibility

Thank YOU

- Aquarhead 
- Junyeong Jeong
- Frédéric PAILLART