A Container Security Survey: Exploits, Attacks, and Defenses

被引:0
|
作者
Jarkas, Omar [1 ]
Ko, Ryan [2 ]
Dong, Naipeng [2 ]
Mahmud, Redo wan [3 ]
机构
[1] Univ Queensland, Brisbane, Australia
[2] Univ Queensland, St Lucia, Australia
[3] Curtin Univ, Perth, Australia
关键词
Containerization security; cloud computing; confidential computing; vul-; nerabilities; hardware-based security; DOCKER; MEMORY;
D O I
10.1145/3715001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Containerization significantly boosts cloud computing efficiency by reducing resource consumption, enhancing scalability, and simplifying orchestration. Yet, these same features introduce notable security vulnerabilities due to the shared Linux kernel and reduced isolation compared to traditional virtual machines (VMs). This architecture, while resource-efficient, increases susceptibility to software vulnerabilities, exposing containers to potential breaches; a single kernel vulnerability could compromise all containers on the same host. Existing academic research on container security is often theoretical and lacks empirical data on the nature of attacks, exploits, and vulnerabilities. Studies that do look at vulnerabilities often focus on specific types. This lack of detailed data and breadth hampers the development of effective mitigation strategies and restricts insights into the inherent weaknesses of containers. To address these gaps, our study introduces a novel taxonomy integrating academic knowledge with industry insights and real-world vulnerabilities, creating a comprehensive and actionable framework for container security. We analyzed over 200 container-related vulnerabilities, categorizing them into 47 exploit types across 11 distinct attack vectors. This taxonomy not only advances theoretical understanding but also facilitates the identification of vulnerabilities and the implementation of effective mitigation strategies in containerized environments. Our approach enhances the resilience of these environments by mapping vulnerabilities to their corresponding exploits and mitigation strategies, especially in complex, multi-tenant cloud settings. By providing actionable insights, our taxonomy helps practitioners enhance container security. Our findings have identified critical areas for further investigation, thereby laying a comprehensive foundation for future research and improving container security in cloud environments.
引用
收藏
页数:36
相关论文
共 50 条
  • [21] A Survey of Attacks and Defenses for Deep Neural Networks
    Machooka, Daniel
    Yuan, Xiaohong
    Esterline, Albert
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 254 - 261
  • [22] A Detailed Survey on Federated Learning Attacks and Defenses
    Sikandar, Hira Shahzadi
    Waheed, Huda
    Tahir, Sibgha
    Malik, Saif U. R.
    Rafique, Waqas
    ELECTRONICS, 2023, 12 (02)
  • [23] A Survey on Split Manufacturing: Attacks, Defenses, and Challenges
    Perez, Tiago D.
    Pagliarini, Samuel
    IEEE ACCESS, 2020, 8 (08): : 184013 - 184035
  • [24] A Survey on Security Threats and Security Defenses of Wireless LAN
    Huang, Bo
    Lu, Rui
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 49 - 52
  • [25] Security of Online Reputation Systems The evolution of attacks and defenses
    Sun, Yan
    Liu, Yuhong
    IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (02) : 87 - 97
  • [26] EM Side Channels in Hardware Security: Attacks and Defenses
    He, Jiaji
    Guo, Xiaolong
    Tehranipoor, Mark
    Vassilev, Apostol
    Jin, Yier
    IEEE DESIGN & TEST, 2022, 39 (02) : 100 - 111
  • [27] Intelligent Connected Vehicle Security: Threats, Attacks and Defenses*
    Wang, Xifeng
    Sun, Limin
    Wang, Chao
    Zhu, Hongsong
    Zhao, Lian
    Yang, Shujie
    Xu, Changqiao
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2023, 39 (06) : 1265 - 1303
  • [28] Adversarial attacks and defenses in explainable artificial intelligence: A survey
    Baniecki, Hubert
    Biecek, Przemyslaw
    INFORMATION FUSION, 2024, 107
  • [29] Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses
    Jakub Szefer
    Journal of Hardware and Systems Security, 2019, 3 (3) : 219 - 234
  • [30] Adversarial attacks and defenses in Speaker Recognition Systems: A survey
    Lan, Jiahe
    Zhang, Rui
    Yan, Zheng
    Wang, Jie
    Chen, Yu
    Hou, Ronghui
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 127