A Container Security Survey: Exploits, Attacks, and Defenses

被引:0
|
作者
Jarkas, Omar [1 ]
Ko, Ryan [2 ]
Dong, Naipeng [2 ]
Mahmud, Redo wan [3 ]
机构
[1] Univ Queensland, Brisbane, Australia
[2] Univ Queensland, St Lucia, Australia
[3] Curtin Univ, Perth, Australia
关键词
Containerization security; cloud computing; confidential computing; vul-; nerabilities; hardware-based security; DOCKER; MEMORY;
D O I
10.1145/3715001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Containerization significantly boosts cloud computing efficiency by reducing resource consumption, enhancing scalability, and simplifying orchestration. Yet, these same features introduce notable security vulnerabilities due to the shared Linux kernel and reduced isolation compared to traditional virtual machines (VMs). This architecture, while resource-efficient, increases susceptibility to software vulnerabilities, exposing containers to potential breaches; a single kernel vulnerability could compromise all containers on the same host. Existing academic research on container security is often theoretical and lacks empirical data on the nature of attacks, exploits, and vulnerabilities. Studies that do look at vulnerabilities often focus on specific types. This lack of detailed data and breadth hampers the development of effective mitigation strategies and restricts insights into the inherent weaknesses of containers. To address these gaps, our study introduces a novel taxonomy integrating academic knowledge with industry insights and real-world vulnerabilities, creating a comprehensive and actionable framework for container security. We analyzed over 200 container-related vulnerabilities, categorizing them into 47 exploit types across 11 distinct attack vectors. This taxonomy not only advances theoretical understanding but also facilitates the identification of vulnerabilities and the implementation of effective mitigation strategies in containerized environments. Our approach enhances the resilience of these environments by mapping vulnerabilities to their corresponding exploits and mitigation strategies, especially in complex, multi-tenant cloud settings. By providing actionable insights, our taxonomy helps practitioners enhance container security. Our findings have identified critical areas for further investigation, thereby laying a comprehensive foundation for future research and improving container security in cloud environments.
引用
收藏
页数:36
相关论文
共 50 条
  • [31] Security Attacks inIoT: A Survey
    Deogirikar, Jyoti
    Vidhate, Amarsinh
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 32 - 37
  • [32] A survey on cybersecurity attacks and defenses for unmanned aerial systems
    Wang, Zhaoxuan
    Li, Yang
    Wu, Shihao
    Zhou, Yuan
    Yang, Libin
    Xu, Yuan
    Zhang, Tianwei
    Pan, Quan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 138
  • [33] Visual privacy attacks and defenses in deep learning: a survey
    Zhang, Guangsheng
    Liu, Bo
    Zhu, Tianqing
    Zhou, Andi
    Zhou, Wanlei
    ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (06) : 4347 - 4401
  • [34] A survey on blockchain systems: Attacks, defenses, and privacy preservation
    Chen, Yourong
    Chen, Hao
    Zhang, Yang
    Han, Meng
    Siddula, Madhuri
    Cai, Zhipeng
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (02):
  • [35] A Survey on Adversarial Attacks and Defenses for Deep Reinforcement Learning
    Liu A.-S.
    Guo J.
    Li S.-M.
    Xiao Y.-S.
    Liu X.-L.
    Tao D.-C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (08): : 1553 - 1576
  • [36] A Survey on Secure WiFi Sensing Technology: Attacks and Defenses
    Liu, Xingyu
    Meng, Xin
    Duan, Hancong
    Hu, Ze
    Wang, Min
    SENSORS, 2025, 25 (06)
  • [37] A Survey on Privacy Attacks and Defenses in Graph Neural Networks
    Luo, Lanhua
    Ren, Wang
    Huang, Huasheng
    Wang, Fengling
    INFORMATION TECHNOLOGY AND CONTROL, 2024, 53 (04):
  • [38] Membership Inference Attacks and Defenses in Federated Learning: A Survey
    Bai, Li
    Hu, Haibo
    Ye, Qingqing
    Li, Haoyang
    Wang, Leixia
    Xu, Jianliang
    ACM COMPUTING SURVEYS, 2025, 57 (04)
  • [39] A Survey of Exploitation Techniques and Defenses for Program Data Attacks
    Wang, Ye
    Li, Qingbao
    Chen, Zhifeng
    Zhang, Ping
    Zhang, Guimin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 154
  • [40] A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses
    Liu, Peidong
    He, Longtao
    Li, Zhoujun
    IEEE ACCESS, 2023, 11 : 26033 - 26047