A3 Refereed book chapter or chapter in a compilation book

Analysis of Security in Modern Container Platforms




AuthorsLauren Samuel, Memarian Mohammed Reza, Conti Mauro, Leppänen Ville

EditorsSanjay Chaudhary, ‎Gaurav Somani, ‎Rajkumar Buyya

Publication year2017

Book title Research Advances in Cloud Computing

First page 351

Last page369

ISBN978-981-10-5025-1

eISBN978-981-10-5026-8

DOIhttps://doi.org/10.1007/978-981-10-5026-8_14

Web address https://link.springer.com/content/pdf/10.1007/978-981-10-5026-8_14.pdf


Abstract

Containers have quickly become a popular alternative to more traditional
virtualizationmethods such as hypervisor-based virtualization. Residing at operating
system level, containers offer a solution that is cheap in terms of resource usage and
flexible in the way it can be applied. The purpose of this chapter is two-fold: first,
we provide a brief overview of available container security solutions and how they
operate, and second, we try to further elaborate and asses the security requirements
for containers as proposed by Reshetova et al. We take a look at the current and
past security threats and Common Vulnerabilities and Exposures (CVE) faced by
container systems and see how attacks that exploit them violate the aforementioned
requirements. Based on our analysis, we contribute by identifying more security
requirements for container systems.



Last updated on 2024-26-11 at 11:34