skip to main content
10.1145/3058060.3058085acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

A Defense Method against Docker Escape Attack

Authors Info & Claims
Published:17 March 2017Publication History

ABSTRACT

As one of the main technologies to support the virtualization of cloud computing, Docker has the characteristics of fast and lightweight virtualization on operating system-level,and is widely used in a variety of cloud platforms. Docker is faced with the risk of attacks that exploit kernel vulnerability by malicious users, once the exploit program in the container launches an effective escape attack can gain root privilege of the host, which will affect the reliability of other containers and the entire system. This paper discusses the existing security mechanism and security issues of Docker, summarize the methods and characteristics of Docker escape attack. And propose a defense method based on status inspection of namespaces, which is proved to be able to detect anomalous processes and prevent escape behaviors.

References

  1. Ann Mary Joy. 2015. Performance comparison between Linux containers and virtual machines.International Conference on Advances in Computer Engineering and Applications(Ghaziabad, India, 19-20 March 2015). 342--346. DOI=http://ieeexplore.ieee.org/document/7164727/Google ScholarGoogle Scholar
  2. Jen-Chieh Wang, Wei-Fun Cheng, Han-Chiang Chen and Hung-Li Chien.2015.Benefit of construct information security environment based on lightweight virtualization technology. International Carnahan Conference on Security Technology. (Sept 21-24, 2015).Google ScholarGoogle ScholarCross RefCross Ref
  3. E. W. Biederman and L. Networx. 2006. Multiple instances of the global linux namespaces. in Proceedings of the Linux Symposium, vol. 1. Citeseer, 101--112.Google ScholarGoogle Scholar
  4. P. B. Menage. 2007. Adding generic process containers to the linux kernel. in Proceedings of the Linux Symposium. Ottawa (Ontario) (June 27-30), vol. 2, 45--57, DOI=https://www.kernel.org/doc/ols/2007/ols2007v2-pages-4558.pdfGoogle ScholarGoogle Scholar
  5. P. Loscocco and S. Smalley. 2001. Integrating flexible support for security policies into the linux operating system. in Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference (Boston, Massachusetts, USA, June 25-30, 2001). C. Cole, Ed. USENIX, 29--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Si-yao Liu, Qiang Liu, Bin Li. 2015. Research on Isolation of Container Based on Docker Technology. SoftWare.Google ScholarGoogle Scholar
  7. Jeeva Chelladhurai, Pethuru Raj Chelliah, Sathish Alampalayam Kumar. 2016. Securing Docker Container from Denial of Service (DoS) Attacks. IEEE International Conference on Services Computing (San Francisco, USA, June 27-July 2, 2016). 856--859.Google ScholarGoogle ScholarCross RefCross Ref
  8. Wen-lin Yang. 2016. The Vulnerability Analysis and Security Enhancement of Docker. Information Security and Technology. Jilin University.Google ScholarGoogle Scholar
  9. Theo Combe, Antony Martin and Roberto Di Pietro. 2016. To Docker or not to Docker: A security perspective.IEEE Cloud Computing. 54--62.Google ScholarGoogle Scholar
  10. Luigi Catuogno, Clemente Galdi. 2016. On The Evaluation of Security Properties of Containerized Systems. 15th International Conference on Ubiquitou Computing and Communications and 8th International Symposium on Cyberspace and Security.(Dec 14-16, 2016).Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICCSP '17: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy
    March 2017
    153 pages
    ISBN:9781450348676
    DOI:10.1145/3058060

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 March 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader