A Container Security Survey: Exploits, Attacks, and Defenses

被引:0
|
作者
Jarkas, Omar [1 ]
Ko, Ryan [2 ]
Dong, Naipeng [2 ]
Mahmud, Redo wan [3 ]
机构
[1] Univ Queensland, Brisbane, Australia
[2] Univ Queensland, St Lucia, Australia
[3] Curtin Univ, Perth, Australia
关键词
Containerization security; cloud computing; confidential computing; vul-; nerabilities; hardware-based security; DOCKER; MEMORY;
D O I
10.1145/3715001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Containerization significantly boosts cloud computing efficiency by reducing resource consumption, enhancing scalability, and simplifying orchestration. Yet, these same features introduce notable security vulnerabilities due to the shared Linux kernel and reduced isolation compared to traditional virtual machines (VMs). This architecture, while resource-efficient, increases susceptibility to software vulnerabilities, exposing containers to potential breaches; a single kernel vulnerability could compromise all containers on the same host. Existing academic research on container security is often theoretical and lacks empirical data on the nature of attacks, exploits, and vulnerabilities. Studies that do look at vulnerabilities often focus on specific types. This lack of detailed data and breadth hampers the development of effective mitigation strategies and restricts insights into the inherent weaknesses of containers. To address these gaps, our study introduces a novel taxonomy integrating academic knowledge with industry insights and real-world vulnerabilities, creating a comprehensive and actionable framework for container security. We analyzed over 200 container-related vulnerabilities, categorizing them into 47 exploit types across 11 distinct attack vectors. This taxonomy not only advances theoretical understanding but also facilitates the identification of vulnerabilities and the implementation of effective mitigation strategies in containerized environments. Our approach enhances the resilience of these environments by mapping vulnerabilities to their corresponding exploits and mitigation strategies, especially in complex, multi-tenant cloud settings. By providing actionable insights, our taxonomy helps practitioners enhance container security. Our findings have identified critical areas for further investigation, thereby laying a comprehensive foundation for future research and improving container security in cloud environments.
引用
收藏
页数:36
相关论文
共 50 条
  • [11] Cyber Security of Smart Grid: Attacks and Defenses
    Nguyen, Tu N.
    Liu, Bing-Hong
    Nguyen, Nam P.
    Chou, Jung-Te
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [12] IoT Security: A Layered Approach for Attacks & Defenses
    Ahemd, Mian Muhammad
    Shah, Munam Ali
    Wahid, Abdul
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 104 - 110
  • [13] Market Manipulation as a Security Problem: Attacks and Defenses
    Mavroudis, Vasilios
    PROCEEDINGS OF THE 12TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2019), 2019,
  • [14] Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
    Muhammad, Zia
    Anwar, Zahid
    Javed, Abdul Rehman
    Saleem, Bilal
    Abbas, Sidra
    Gadekallu, Thippa Reddy
    TECHNOLOGIES, 2023, 11 (03)
  • [15] A Survey of Federated Learning: Review, Attacks, Defenses
    Yao, Zhongyi
    Cheng, Jieren
    Fu, Cebin
    Huang, Zhennan
    BIG DATA AND SECURITY, ICBDS 2023, PT I, 2024, 2099 : 166 - 177
  • [16] Attacks and defenses in user authentication systems: A survey
    Wang, Xuerui
    Yan, Zheng
    Zhang, Rui
    Zhang, Peng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 188
  • [17] Privacy Attacks and Defenses in Machine Learning: A Survey
    Liu, Wei
    Han, Xun
    He, Meiling
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 413 - 422
  • [18] Survey on adversarial attacks and defenses for object detection
    Wang, Xinxin
    Chen, Jing
    He, Kun
    Zhang, Zijun
    Du, Ruiying
    Li, Qiao
    She, Jisi
    Tongxin Xuebao/Journal on Communications, 2023, 44 (11): : 260 - 277
  • [19] A Survey of Backdoor Attacks and Defenses on Neural Networks
    Wang, Xu-Tong
    Yin, Jie
    Liu, Chao-Ge
    Xu, Chen-Chen
    Huang, Hao
    Wang, Zhi
    Zhang, Fang-Jiao
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (08): : 1713 - 1743
  • [20] Survey on Privacy Attacks and Defenses in Machine Learning
    Liu R.-X.
    Chen H.
    Guo R.-Y.
    Zhao D.
    Liang W.-J.
    Li C.-P.
    Chen, Hong (chong@ruc.edu.cn), 1600, Chinese Academy of Sciences (31): : 866 - 892