Research of Penetration Testing Technology in Docker Environment

被引:0
作者
Lu, Tao [1 ]
Chen, Jie [1 ]
机构
[1] JiangNan Inst Comp Technol, Wuxi 214083, Peoples R China
来源
PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017) | 2017年 / 141卷
关键词
Docker security; Penetration testing; Denial of service; Container escape; Side channel;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the increasing use of cloud computing, virtualization has developed rapidly as the key technology. Especially, Docker container technology has become the focus of attention of researchers because of its advantages of easy deployment and high performance. Consequently the research of Docker security has become more and more important. Based on the brief introduction of Docker architecture and components, the security of Docker is analyzed quantitatively, and is compared with the traditional virtualization. The importance of the penetration testing technology in ensuring the security of the container is clarified. Then, the typical penetration testing technology of denial service, container escape and side channel in Docker environment is studied. Finally, the penetration testing process in Docker container environment is analyzed in detail.
引用
收藏
页码:1354 / 1359
页数:6
相关论文
共 50 条
  • [41] Agentless Automation Model for Post Exploitation Penetration Testing
    Maddala, Saraswati
    Patil, Sonali
    [J]. INTELLIGENT COMPUTING, INFORMATION AND CONTROL SYSTEMS, ICICCS 2019, 2020, 1039 : 529 - 539
  • [42] Inner Profile Measurement for Pipes Using Penetration Testing
    Ross, Robert
    Baji, Avinash
    Barnett, Dean
    [J]. SENSORS, 2019, 19 (02):
  • [43] PENETRATION TESTING PROFESSIONAL ETHICS: A CONCEPTUAL MODEL AND TAXONOMY
    Pierce, Justin D.
    Jones, Ashley G.
    Warren, Matthew J.
    [J]. AUSTRALASIAN JOURNAL OF INFORMATION SYSTEMS, 2006, 13 (02) : 193 - 200
  • [44] IoT-PEN: A Penetration Testing Framework for IoT
    Yadav, Geeta
    Paul, Kolin
    Allakany, Alaa
    Okamura, Koji
    [J]. 2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 196 - 201
  • [45] Tool Based Implementation of SQL Injection for Penetration Testing
    Nagpal, Bharti
    Chauhan, Naresh
    Singh, Nanhay
    Panesar, Angel
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 746 - 749
  • [46] Automated Penetration Testing in 5G Networks
    Iavich, Maxim
    Odarchenko, Roman
    [J]. INTEGRATED COMPUTER TECHNOLOGIES IN MECHANICAL ENGINEERING-2023, VOL 2, ICTM 2023, 2024, 996 : 440 - 451
  • [47] Penetration testing of OPC as part of process control systems
    Line, Maria B.
    Jaatun, Martin Gilje
    Bin Cheah, Zi
    Faruk, A. B. M. Omar
    Garnes, Havard Husevag
    Wedum, Petter
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 271 - +
  • [48] Application of the Selected Penetration Testing Approach for Computer System
    Zakarija, Ivona
    Domic, Tomislav
    Batos, Vedran
    [J]. NASE MORE, 2013, 60 (3-4): : 90 - 94
  • [49] Penterep: Comprehensive penetration testing with adaptable interactive checklists
    Lazarov, Willi
    Seda, Pavel
    Martinasek, Zdenek
    Kummel, Roman
    [J]. Computers and Security, 2025, 154
  • [50] Hierarchical Action Embedding for Effective Autonomous Penetration Testing
    Hoang Viet Nguyen
    Uehara, Tetsutaro
    [J]. 2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY COMPANION, QRS-C, 2022, : 152 - 157