The three maintainers on stage together
Multimessenger Security at KubeCon Atlanta 2025
Our adaptive eBPF SOC for Kubernetes is outlined at KubeCon (25.11.2025)
Förderjahr 2025 / Projekt Call #20 / ProjektID: 7918 / Projekt: Sovereign SOC

The kubernetes SOC is a worldwide collaboration of leading eBPF projects in the cloudnative space. Copresenting how our ideas can be used in real life was rewarding and showcased the power of open source.

 

What we built as a first step

We combined three open-source projects to act as one unified security system:

  • Kubescape – learns what “normal” behavior looks like in an application.

  • Pixie – observes what applications actually do inside the cluster.

  • Clickhouse – stores detailed evidence when something suspicious happens.

Together, they outline a “prototypical SOC” (Security Operations Center) that runs completely inside the user’s own environment, even though it has two components: the sensors on each linux node and the central cockpit into which all data is collected.

 

Highlevel schematic overview

What the System Can Do

1. It learns normal behavior

The system automatically builds a profile of how each application normally behaves. This means it can notice when something suddenly changes—even if no one wrote a rule for it.

2. It detects suspicious behavior in real time

During the demonstration, we deliberately introduced a malicious software update into a test application. The system immediately noticed an unusual action that had never happened before. This early warning triggered the entire adaptive process.

3. It gathers evidence only when there are indicators of compromise

Instead of saving everything all the time, the system only collects detailed data when something suspicious occurs. This makes the system efficient and avoids unnecessary storage costs.

4. It zooms into the indicators adaptively

We used a "mock" compromised clickhouse application server, that gave us an initial "Indicator" in the form of a single system call. This, by itself, looked like it was just part of the rest of the software, but the adaptive data-gathering revealed that it was instead a very hard-to-detect io_uring rootkit. The individual adaptive eBPF probes revealed in the "zoom-in":

  • which internal service the compromised application contacted,

  • how often it reached out,

  • the unusual patterns in its network traffic,

  • and even some of the exact part of the malicious code: revealing that whatever was causing the anomaly must have been written in a totally different programming language.

  • the smoking gun evidence that this was highly malicious, was the detection of what the suspicous process was doing with the cache: it was reading tokens and sending them in some obscure binary format to a command-and-control server

 

 

Convince yourself in this free live online lab

https://labs.iximiuz.com/tutorials/musketkubecon-e3b29045 

Why This Matters

Our demonstration showed that combining open-source tools creates a much stronger and clearer view of what is happening in a system. This “multimessenger” approach allows subtle attacks to be spotted quickly while keeping data sovereign and fully under user control.

 

Next steps

After showcasing the first time, how this combination of tools is more powerful than the sum of its parts, we now must build out the system to a functioning prototype

 

 Learn more about the OpenSource Projects:

https://github.com/pixie-io

- https://github.com/kubescape

- https://github.com/k8sstormcenter

 

Tags:

Kubernetes

Constanze Roedig

Profile picture for user constanze.roedig
Constanze is an astrophysicist turned entrepreneur: she spent over 15 years designing and implementing resilient complex systems for finance and government. CS lecturer and key researcher. Created the K8s Stormcenter for Open Threat Intelligence. Her research is on improving security using modern and emerging technologies such as eBPF, WebAssembly and AI. Her vision is to create practical and achievable security implementations usable in defendable systems for a resilient society.

Skills:

eBPF
CAPTCHA
Diese Frage dient der Überprüfung, ob Sie ein menschlicher Besucher sind und um automatisierten SPAM zu verhindern.