AN APPROACH OF EXPLOITING DOCKER CONTAINER SECURITY
Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.11, No. 07)Publication Date: 2020-07-31
Authors : Puneeth K M Pooja P;
Page : 595-601
Keywords : Docker; Container; Elastic search; dockerizing;
Abstract
Docker is an open-source platform that can be used for shipping, developing, and running the applications for quick delivery and easy management of the application. Docker improves the performance and efficiency as it uses a single kernel. By pulling the image from the Docker repository, the user can create multiple instances of the same image in the local machine. Hence, Docker containers have become very popular nowadays with its ease of use. However, the Docker containers are also prone to several security attacks due to the absence of hypervisor. This paper focuses on the process of running the application by creating the container. As the Docker, containers are prone to security attacks the paper also focuses on the security misconfiguration present in the Docker containers by considering an example of an elastic search container. The process of exploiting the elastic search container is also presented in this paper. The security vulnerabilities in the Docker occurs because of the configuration or the usage of insecure versions of the packages in the Docker images. Hence, the developer needs to be aware of the packages and need to use the non-vulnerable packages to build a secure image.
Other Latest Articles
- THEORETICAL MODEL FOR AN APPROXIMATE ONE STEP FORECASTING SCHEME
- SIX SIGMA APPLICATION IN MANUFACTURING SPECIAL PROCESS: A CASE STUDY ON RESISTANCE WELDING
- ACCIDENT ALERT SYSTEM
- RELATIONSHIP DEBT RATIO AND MANAGERIAL OWNERSHIP : FREE CASH FLOW HYPOTHESIS
- COMPOSITE NORM PROPORTIONATE NORMALIZED MINIMUM ERROR ENTROPY ALGORITHM FOR CLUMP SPARSE CHANNEL ESTIMATION
Last modified: 2021-02-19 22:36:55