Show simple item record

dc.contributor.authorGantikow, H
dc.contributor.authorReich, C
dc.contributor.authorKnahl, M
dc.contributor.authorClarke, Nathan
dc.date.accessioned2020-07-07T14:32:59Z
dc.date.available2020-07-07T14:32:59Z
dc.date.issued2020-06-04
dc.identifier.isbn9783030494315
dc.identifier.urihttp://hdl.handle.net/10026.1/15847
dc.description.abstract

Containers have to be secured in a multi-tenant environment. To secure the use of containerized environments, the effectiveness of a rule-based security monitoring approach have been investigated. The approach of this paper can be used to detect a wide range of potentially malicious behaviour of workloads in containerized environments. Additionally is able to monitor the actual container runtime for misuse and misconfiguration. In order to evaluate the detection capabilities of the open-source tools utilized in a container, various scenarios of undesired behaviour are closely examined. In addition, the performance overhead and functional limitations associated with workload monitoring are discussed. The proposed approach is effective in many of the scenarios examined and its performance overhead is adequate, if appropriate event filtering is applied.

dc.format.extent66-86
dc.language.isoen
dc.publisherSpringer International Publishing
dc.relation.ispartofCloud Computing and Services Science 9th International Conference, CLOSER 2019, Heraklion, Crete, Greece, May 2–4, 2019, Revised Selected Papers
dc.titleRule-Based Security Monitoring of Containerized Environments
dc.typechapter
plymouth.volume1218 CCIS
plymouth.publication-statusPublished
plymouth.seriesCommunications in Computer and Information Science (CCIS, volume 1218)
dc.identifier.doi10.1007/978-3-030-49432-2_4
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1007/978-3-030-49432-2_4
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeBook chapter


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV