Research of Penetration Testing Technology in Docker Environment

被引:0
|
作者
Lu, Tao [1 ]
Chen, Jie [1 ]
机构
[1] JiangNan Inst Comp Technol, Wuxi 214083, Peoples R China
来源
PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017) | 2017年 / 141卷
关键词
Docker security; Penetration testing; Denial of service; Container escape; Side channel;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the increasing use of cloud computing, virtualization has developed rapidly as the key technology. Especially, Docker container technology has become the focus of attention of researchers because of its advantages of easy deployment and high performance. Consequently the research of Docker security has become more and more important. Based on the brief introduction of Docker architecture and components, the security of Docker is analyzed quantitatively, and is compared with the traditional virtualization. The importance of the penetration testing technology in ensuring the security of the container is clarified. Then, the typical penetration testing technology of denial service, container escape and side channel in Docker environment is studied. Finally, the penetration testing process in Docker container environment is analyzed in detail.
引用
收藏
页码:1354 / 1359
页数:6
相关论文
共 50 条
  • [21] Reinforcement Learning for Efficient Network Penetration Testing
    Ghanem, Mohamed C.
    Chen, Thomas M.
    INFORMATION, 2020, 11 (01)
  • [22] SoK: A Comparison of Autonomous Penetration Testing Agents
    Simon, Raphael
    Mees, Wim
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [23] A Review of Standardization for Penetration Testing Reports and Documents
    Zakaria, Mohd Nizam
    Phin, Poon Ai
    Mohmad, Nurfarahin
    Ismail, Saiful Adli
    Kama, Mohd Nazri
    Yusop, Othman
    2019 6TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS: EMPOWERING DIGITAL INNOVATION (ICRIIS 2019), 2019,
  • [24] Automated Wi-Fi Penetration Testing
    Kadam, S. P.
    Mahajan, Bhagyashree
    Patanwala, Mariya
    Sanas, Prajakta
    Vidyarthi, Shruti
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1092 - 1096
  • [25] A STUDY OF NETWORK SECURITY USING PENETRATION TESTING
    Shanmugapriya, R.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 371 - 374
  • [26] Penetration Testing for Internet of Things and Its Automation
    Chu, Ge
    Lisitsa, Alexei
    IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2018, : 1479 - 1484
  • [27] Quantitative Penetration Testing with Item Response Theory
    Arnold, Florian
    Pieters, Wolter
    Stoelinga, Marielle
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY (IAS), 2013, : 49 - +
  • [28] Security Quality Assurance through Penetration Testing
    Shaukat, Kamran
    Faisal, Amber
    Masood, Rabia
    Usman, Ayesha
    Shaukat, Usman
    PROCEEDINGS OF THE 2016 19TH INTERNATIONAL MULTI-TOPIC CONFERENCE (INMIC), 2016, : 131 - 136
  • [29] Universal Framework for Unmanned System Penetration Testing
    Kobezak, Philip
    Abbott-McCune, Sam
    Tront, Joseph
    Marchany, Randy
    Wicks, Alfred
    UNMANNED SYSTEMS TECHNOLOGY XV, 2013, 8741
  • [30] Applying Systems Engineering Principles to Penetration Testing
    Easttom, Chuck
    Butler, William
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 127 - 134