A Container Security Survey: Exploits, Attacks, and Defenses

被引:0
|
作者
Jarkas, Omar [1 ]
Ko, Ryan [2 ]
Dong, Naipeng [2 ]
Mahmud, Redo wan [3 ]
机构
[1] Univ Queensland, Brisbane, Australia
[2] Univ Queensland, St Lucia, Australia
[3] Curtin Univ, Perth, Australia
关键词
Containerization security; cloud computing; confidential computing; vul-; nerabilities; hardware-based security; DOCKER; MEMORY;
D O I
10.1145/3715001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Containerization significantly boosts cloud computing efficiency by reducing resource consumption, enhancing scalability, and simplifying orchestration. Yet, these same features introduce notable security vulnerabilities due to the shared Linux kernel and reduced isolation compared to traditional virtual machines (VMs). This architecture, while resource-efficient, increases susceptibility to software vulnerabilities, exposing containers to potential breaches; a single kernel vulnerability could compromise all containers on the same host. Existing academic research on container security is often theoretical and lacks empirical data on the nature of attacks, exploits, and vulnerabilities. Studies that do look at vulnerabilities often focus on specific types. This lack of detailed data and breadth hampers the development of effective mitigation strategies and restricts insights into the inherent weaknesses of containers. To address these gaps, our study introduces a novel taxonomy integrating academic knowledge with industry insights and real-world vulnerabilities, creating a comprehensive and actionable framework for container security. We analyzed over 200 container-related vulnerabilities, categorizing them into 47 exploit types across 11 distinct attack vectors. This taxonomy not only advances theoretical understanding but also facilitates the identification of vulnerabilities and the implementation of effective mitigation strategies in containerized environments. Our approach enhances the resilience of these environments by mapping vulnerabilities to their corresponding exploits and mitigation strategies, especially in complex, multi-tenant cloud settings. By providing actionable insights, our taxonomy helps practitioners enhance container security. Our findings have identified critical areas for further investigation, thereby laying a comprehensive foundation for future research and improving container security in cloud environments.
引用
收藏
页数:36
相关论文
共 50 条
  • [1] VoIP Security: Vulnerabilities, Exploits, and Defenses
    Wang, Xinyuan
    Zhang, Ruishan
    ADVANCES IN COMPUTERS, VOL 81, 2011, 81 : 1 - 49
  • [2] A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
    Chen, Huashan
    Pendleton, Marcus
    Njilla, Laurent
    Xu, Shouhuai
    ACM COMPUTING SURVEYS, 2020, 53 (03)
  • [3] The state of affairs in BGP security: A survey of attacks and defenses
    Mitseva, Asya
    Panchenko, Andriy
    Engel, Thomas
    COMPUTER COMMUNICATIONS, 2018, 124 : 45 - 60
  • [4] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
    Abu Elkhail, Abdulrahman
    Refat, Rafi Ud Daula
    Habre, Ricardo
    Hafeez, Azeem
    Bacha, Anys
    Malik, Hafiz
    IEEE ACCESS, 2021, 9 : 162401 - 162437
  • [5] Physical security devices for computer subsystems: A survey of attacks and defenses
    Weingart, SH
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS, 2001, 1965 : 302 - 317
  • [6] A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
    Chao, Daichong
    Xu, Dawei
    Gao, Feng
    Zhang, Chuan
    Zhang, Weiting
    Zhu, Liehuang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1775 - 1829
  • [7] The Survey of RFID Attacks and Defenses
    Li, Hong
    Chen, YongHui
    He, ZhangQing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [8] Defenses to Membership Inference Attacks: A Survey
    Hu, Li
    Yan, Anli
    Yan, Hongyang
    Li, Jin
    Huang, Teng
    Zhang, Yingying
    Dong, Changyu
    Yang, Chunsheng
    ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [9] Survey of Attacks and Defenses against SGX
    Zhang, Yahui
    Zhao, Min
    Li, Tingquan
    Han, Huan
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1492 - 1496
  • [10] Automotive Security in the Digital Era: A Comprehensive Survey of Attacks and Defenses for Keyless Entry System
    Zheng, Yong
    Zhang, Man
    Li, Xianfeng
    Chen, Xingchi
    Zhang, Zhourui
    Zhu, Jiaming
    Shan, Chun
    Wu, Guocheng
    COMPUTATIONAL AND EXPERIMENTAL SIMULATIONS IN ENGINEERING, ICCES 2024-VOL 2, 2025, 173 : 444 - 467