Skip to main content

2018 | OriginalPaper | Buchkapitel

Security Analysis of Container Images Using Cloud Analytics Framework

verfasst von : Byungchul Tak, Hyekyung Kim, Sahil Suneja, Canturk Isci, Prabhakar Kudva

Erschienen in: Web Services – ICWS 2018

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Container technology has become an integral part of today’s major IT services. Although it offers several benefits, it also introduces new challenges for operating and maintaining secure container environments. One such challenge is to retain the ability to detect and address the containers’ vulnerabilities and compliance violations. However, designing an effective solution to enable this capability must be based on the accurate understanding of characteristics observed from actual container images and instances. To contribute toward this objective, we have built a general data processing framework, applying the principles of the state-of-the-art. It is a system that decouples the data collection process from the analysis so as to allow user to focus more on building new analysis logics rather than on the tools for monitoring agents. We applied it to the analysis of container images from the Docker Hub image repository, to learn about their security posture. In this work we present various interesting findings and new insights from analyzing the public image corpus. We have learned that more than 92% of the images contain compliance violations and/or vulnerable packages.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We use the terms ‘scan’ and ‘crawl’ interchangeably.
 
Literatur
10.
Zurück zum Zitat Cito, J., Schermann, G., Wittern, J.E., Leitner, P., Zumberi, S., Gall, H.C.: An empirical analysis of the docker container ecosystem on GitHub. In: Proceedings of the 14th International Conference on Mining Software Repositories, pp. 323–333. IEEE Press (2017) Cito, J., Schermann, G., Wittern, J.E., Leitner, P., Zumberi, S., Gall, H.C.: An empirical analysis of the docker container ecosystem on GitHub. In: Proceedings of the 14th International Conference on Mining Software Repositories, pp. 323–333. IEEE Press (2017)
12.
Zurück zum Zitat Combe, T., Martin, A., Di Pietro, R.: To docker or not to docker: a security perspective. IEEE Cloud Comput. 3(5), 54–62 (2016)CrossRef Combe, T., Martin, A., Di Pietro, R.: To docker or not to docker: a security perspective. IEEE Cloud Comput. 3(5), 54–62 (2016)CrossRef
16.
Zurück zum Zitat Gschwind, K., Adam, C., Duri, S., Nadgowda, S., Vukovic, M.: Optimizing service delivery with minimal runtimes. In: Proceedings of the 15th International Conference on Service-Oriented Computing (2017) Gschwind, K., Adam, C., Duri, S., Nadgowda, S., Vukovic, M.: Optimizing service delivery with minimal runtimes. In: Proceedings of the 15th International Conference on Service-Oriented Computing (2017)
19.
Zurück zum Zitat Koller, R., Isci, C., Suneja, S., de Lara, E.: Unified monitoring and analytics in the cloud. In: 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 2015), Santa Clara, CA. USENIX Association (2015) Koller, R., Isci, C., Suneja, S., de Lara, E.: Unified monitoring and analytics in the cloud. In: 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 2015), Santa Clara, CA. USENIX Association (2015)
21.
Zurück zum Zitat Oliveira, F., Suneja, S., Nadgowda, S., Nagpurkar, P., Isci, C.: Opvis: extensible, cross-platform operational visibility and analytics for cloud. In: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, pp. 43–49. ACM (2017) Oliveira, F., Suneja, S., Nadgowda, S., Nagpurkar, P., Isci, C.: Opvis: extensible, cross-platform operational visibility and analytics for cloud. In: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, pp. 43–49. ACM (2017)
23.
Zurück zum Zitat Rastogi, V., Niddodi, C., Mohan, S., Jha, S.: New directions for container debloating. In: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, pp. 51–56. ACM (2017) Rastogi, V., Niddodi, C., Mohan, S., Jha, S.: New directions for container debloating. In: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, pp. 51–56. ACM (2017)
25.
Zurück zum Zitat Shu, R., Gu, X., Enck, W.: A study of security vulnerabilities on docker hub. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, pp. 269–280. ACM, New York (2017) Shu, R., Gu, X., Enck, W.: A study of security vulnerabilities on docker hub. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, pp. 269–280. ACM, New York (2017)
26.
Zurück zum Zitat Tak, B., Isci, C., Duri, S., Bila, N., Nadgowda, S., Doran, J.: Understanding security implications of using containers in the cloud. In: 2017 USENIX Annual Technical Conference (USENIX ATC 17), Santa Clara, CA, pp. 313–319. USENIX Association (2017) Tak, B., Isci, C., Duri, S., Bila, N., Nadgowda, S., Doran, J.: Understanding security implications of using containers in the cloud. In: 2017 USENIX Annual Technical Conference (USENIX ATC 17), Santa Clara, CA, pp. 313–319. USENIX Association (2017)
29.
Zurück zum Zitat Xu, T., Marinov, D.: Mining container image repositories for software configuration and beyond. arXiv preprint arXiv:1802.03558 (2018) Xu, T., Marinov, D.: Mining container image repositories for software configuration and beyond. arXiv preprint arXiv:​1802.​03558 (2018)
Metadaten
Titel
Security Analysis of Container Images Using Cloud Analytics Framework
verfasst von
Byungchul Tak
Hyekyung Kim
Sahil Suneja
Canturk Isci
Prabhakar Kudva
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-94289-6_8

Premium Partner