Skip to main content
Top

2018 | OriginalPaper | Chapter

Security Analysis of Container Images Using Cloud Analytics Framework

Authors : Byungchul Tak, Hyekyung Kim, Sahil Suneja, Canturk Isci, Prabhakar Kudva

Published in: Web Services – ICWS 2018

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Container technology has become an integral part of today’s major IT services. Although it offers several benefits, it also introduces new challenges for operating and maintaining secure container environments. One such challenge is to retain the ability to detect and address the containers’ vulnerabilities and compliance violations. However, designing an effective solution to enable this capability must be based on the accurate understanding of characteristics observed from actual container images and instances. To contribute toward this objective, we have built a general data processing framework, applying the principles of the state-of-the-art. It is a system that decouples the data collection process from the analysis so as to allow user to focus more on building new analysis logics rather than on the tools for monitoring agents. We applied it to the analysis of container images from the Docker Hub image repository, to learn about their security posture. In this work we present various interesting findings and new insights from analyzing the public image corpus. We have learned that more than 92% of the images contain compliance violations and/or vulnerable packages.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
We use the terms ‘scan’ and ‘crawl’ interchangeably.
 
Literature
10.
go back to reference Cito, J., Schermann, G., Wittern, J.E., Leitner, P., Zumberi, S., Gall, H.C.: An empirical analysis of the docker container ecosystem on GitHub. In: Proceedings of the 14th International Conference on Mining Software Repositories, pp. 323–333. IEEE Press (2017) Cito, J., Schermann, G., Wittern, J.E., Leitner, P., Zumberi, S., Gall, H.C.: An empirical analysis of the docker container ecosystem on GitHub. In: Proceedings of the 14th International Conference on Mining Software Repositories, pp. 323–333. IEEE Press (2017)
12.
go back to reference Combe, T., Martin, A., Di Pietro, R.: To docker or not to docker: a security perspective. IEEE Cloud Comput. 3(5), 54–62 (2016)CrossRef Combe, T., Martin, A., Di Pietro, R.: To docker or not to docker: a security perspective. IEEE Cloud Comput. 3(5), 54–62 (2016)CrossRef
16.
go back to reference Gschwind, K., Adam, C., Duri, S., Nadgowda, S., Vukovic, M.: Optimizing service delivery with minimal runtimes. In: Proceedings of the 15th International Conference on Service-Oriented Computing (2017) Gschwind, K., Adam, C., Duri, S., Nadgowda, S., Vukovic, M.: Optimizing service delivery with minimal runtimes. In: Proceedings of the 15th International Conference on Service-Oriented Computing (2017)
19.
go back to reference Koller, R., Isci, C., Suneja, S., de Lara, E.: Unified monitoring and analytics in the cloud. In: 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 2015), Santa Clara, CA. USENIX Association (2015) Koller, R., Isci, C., Suneja, S., de Lara, E.: Unified monitoring and analytics in the cloud. In: 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 2015), Santa Clara, CA. USENIX Association (2015)
21.
go back to reference Oliveira, F., Suneja, S., Nadgowda, S., Nagpurkar, P., Isci, C.: Opvis: extensible, cross-platform operational visibility and analytics for cloud. In: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, pp. 43–49. ACM (2017) Oliveira, F., Suneja, S., Nadgowda, S., Nagpurkar, P., Isci, C.: Opvis: extensible, cross-platform operational visibility and analytics for cloud. In: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, pp. 43–49. ACM (2017)
23.
go back to reference Rastogi, V., Niddodi, C., Mohan, S., Jha, S.: New directions for container debloating. In: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, pp. 51–56. ACM (2017) Rastogi, V., Niddodi, C., Mohan, S., Jha, S.: New directions for container debloating. In: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, pp. 51–56. ACM (2017)
25.
go back to reference Shu, R., Gu, X., Enck, W.: A study of security vulnerabilities on docker hub. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, pp. 269–280. ACM, New York (2017) Shu, R., Gu, X., Enck, W.: A study of security vulnerabilities on docker hub. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, pp. 269–280. ACM, New York (2017)
26.
go back to reference Tak, B., Isci, C., Duri, S., Bila, N., Nadgowda, S., Doran, J.: Understanding security implications of using containers in the cloud. In: 2017 USENIX Annual Technical Conference (USENIX ATC 17), Santa Clara, CA, pp. 313–319. USENIX Association (2017) Tak, B., Isci, C., Duri, S., Bila, N., Nadgowda, S., Doran, J.: Understanding security implications of using containers in the cloud. In: 2017 USENIX Annual Technical Conference (USENIX ATC 17), Santa Clara, CA, pp. 313–319. USENIX Association (2017)
29.
Metadata
Title
Security Analysis of Container Images Using Cloud Analytics Framework
Authors
Byungchul Tak
Hyekyung Kim
Sahil Suneja
Canturk Isci
Prabhakar Kudva
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-94289-6_8

Premium Partner