Runtime Threat Detection with Falco
Real-time threat detection system for Kubernetes using Falco with eBPF driver for kernel-level syscall monitoring. Implements custom detection rules mapped to MITRE ATT&CK framework for container security monitoring and alerting on suspicious activities within 5 seconds of occurrence.
The system monitors syscalls, Kubernetes audit logs, and runtime behaviors to detect malicious activities such as shell spawning in containers, unauthorized network connections, cryptomining processes, and privilege escalation attempts. Integrated with Falcosidekick for multi-channel alerting via Slack webhooks.
Deployed on Kubernetes using Helm charts with eBPF driver configuration for optimal performance. Features 10+ custom detection rules covering execution (T1609), resource hijacking (T1496), and container escapes (T1613) following MITRE ATT&CK Containers Matrix for comprehensive threat coverage.
Key Features
- Falco deployment with eBPF driver for low-overhead syscall monitoring without kernel modules
- 10+ custom detection rules mapped to MITRE ATT&CK framework (T1609, T1496, T1613)
- Real-time detection of spawned shells, suspicious network connections, and cryptomining processes
- Kubernetes audit log integration for complete API server visibility
- Falcosidekick integration for alert routing to Slack with severity-based filtering
- Detection latency under 5 seconds from event occurrence to alert notification
- Priority-based alert classification (CRITICAL/WARNING/INFO) for incident triage
- JSON-formatted alert output with container metadata and pod context
- Helm chart deployment for reproducible installations across clusters