Research of Penetration Testing Technology in Docker Environment

被引:0
|
作者
Lu, Tao [1 ]
Chen, Jie [1 ]
机构
[1] JiangNan Inst Comp Technol, Wuxi 214083, Peoples R China
来源
PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017) | 2017年 / 141卷
关键词
Docker security; Penetration testing; Denial of service; Container escape; Side channel;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the increasing use of cloud computing, virtualization has developed rapidly as the key technology. Especially, Docker container technology has become the focus of attention of researchers because of its advantages of easy deployment and high performance. Consequently the research of Docker security has become more and more important. Based on the brief introduction of Docker architecture and components, the security of Docker is analyzed quantitatively, and is compared with the traditional virtualization. The importance of the penetration testing technology in ensuring the security of the container is clarified. Then, the typical penetration testing technology of denial service, container escape and side channel in Docker environment is studied. Finally, the penetration testing process in Docker container environment is analyzed in detail.
引用
收藏
页码:1354 / 1359
页数:6
相关论文
共 50 条
  • [1] A Review of Penetration Testing and Vulnerability Assessment in Cloud Environment
    Yurtseven, Ilke
    Bagriyanik, Selami
    2020 TURKISH NATIONAL SOFTWARE ENGINEERING SYMPOSIUM (UYMS), 2020, : 35 - 40
  • [2] Vulnerability Assessment & Penetration Testing as a Cyber Defence Technology
    Goel, Jai Narayan
    Mehtre, B. M.
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 710 - 715
  • [3] A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions
    Alhamed, Mariam
    Rahman, M. M. Hafizur
    APPLIED SCIENCES-BASEL, 2023, 13 (12):
  • [4] Penetration Testing in a Box
    Epling, Lee
    Hinkel, Brandon
    Hu, Yi
    PROCEEDINGS OF THE 2015 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE, 2015,
  • [5] An Overview of Penetration Testing
    Phong, Chiem Trieu
    Yan, Wei Qi
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (04) : 50 - 74
  • [6] Methodology for Penetration Testing
    Alisherov, Farkhod A.
    Sattarova, Feruza Y.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2009, 2 (02): : 43 - 50
  • [7] Automatic generation algorithm of penetration graph in penetration testing
    Qiu, Xue
    Wang, Shuguang
    Jia, Qiong
    Xia, Chunhe
    Lv, LiangShuang
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 531 - 537
  • [8] AI-enabled IoT penetration testing: state-of-the-art and research challenges
    Greco, Claudia
    Fortino, Giancarlo
    Crispo, Bruno
    Choo, Kim-Kwang Raymond
    ENTERPRISE INFORMATION SYSTEMS, 2023, 17 (09)
  • [9] Penetration testing of connected households
    Heiding, Fredrik
    Sueren, Emre
    Olegard, Johannes
    Lagerstroem, Robert
    COMPUTERS & SECURITY, 2023, 126
  • [10] Penetration Testing for Web Services
    Antunes, Nuno
    Vieira, Marco
    COMPUTER, 2014, 47 (02) : 30 - 36