Container Performance and Vulnerability Management for Container Security Using Docker Engine
المؤلف | Alyas, Tahir |
المؤلف | Ali, Sikandar |
المؤلف | Khan, Habib Ullah |
المؤلف | Samad, Ali |
المؤلف | Alissa, Khalid |
المؤلف | Saleem, Muhammad Asif |
تاريخ الإتاحة | 2022-12-26T08:22:43Z |
تاريخ النشر | 2022-08-10 |
اسم المنشور | Security and Communication Networks |
المعرّف | http://dx.doi.org/10.1155/2022/6819002 |
الاقتباس | Alyas, T., Ali, S., Khan, H. U., Samad, A., Alissa, K., & Saleem, M. A. (2022). Container Performance and Vulnerability Management for Container Security Using Docker Engine. Security and Communication Networks, 2022. |
الرقم المعياري الدولي للكتاب | 1939-0114 |
الملخص | Containers have evolved to support microservice architecture as a low-cost alternative to virtual machines. Containers are increasingly prevalent in the virtualization landscape because of better working; containers can bear considerably less overhead than the conventional hypervisor-based component virtual machines. However, containers directly communicate with the host kernel, and attackers can co-locate containers in the host system quicker than virtual machines. This causes significant security issues in container technology. The security hardening system is currently targeted at implementing universal access management regulations that make it difficult to assess the required procedure for accessing containers. Security mechanisms include an explicit awareness of the purpose and actions of the container and entail manual interaction and configuration. A user-friendly container protection scheme implemented an access policy to comply with its anticipated and legitimate application performance. In this study, container technology constraints have been overcome by proposing a unique Docker-sec mechanism. Docker-sec uses four mechanisms; the original collection has been improved during container runtime by additional rules that constrain the capacity of the container, further representing the applications in practice, file system, processes, network isolation, and vulnerability scanning of Docker images over different workload. Different vulnerabilities have been scanned with a CVE severity level. Results showed that inter-container communication with the system is more secure containers from zero vulnerabilities with an overhead of 3.45%. |
راعي المشروع | Qatar University Internal Grant - No. IRCC-2021-010. |
اللغة | en |
الناشر | Wiley |
الموضوع | Cloud computing Security Vulnerabilities Virtualization technology Dynamic monitoring |
النوع | Article |
رقم المجلد | 2022 |
ESSN | 1939-0122 |
الملفات في هذه التسجيلة
هذه التسجيلة تظهر في المجموعات التالية
-
المحاسبة ونظم المعلومات [534 items ]