Show simple item record

dc.contributor.authorGantikow, H
dc.contributor.authorReich, C
dc.contributor.authorKnahl, M
dc.contributor.authorClarke, Nathan
dc.date.accessioned2023-02-20T12:21:00Z
dc.date.available2023-02-20T12:21:00Z
dc.date.issued2019
dc.identifier.isbn9789897583650
dc.identifier.urihttp://hdl.handle.net/10026.1/20462
dc.description.abstract

In order to further support the secure operation of containerized environments and to extend already established security measures, we propose a rule-based security monitoring, which can be used for the detection of a variety of misuse and attacks. The capabilities of the open-source tools used to monitor containers are closely examined and the possibility of detecting undesired behavior is evaluated on the basis of various scenarios. Further, the limits of the approach taken and the associated performance overhead will be discussed. The results show that the proposed approach is effective in many scenarios and comes at a low performance overhead cost.

dc.format.extent543-550
dc.language.isoen
dc.publisherSCITEPRESS - Science and Technology Publications
dc.subjectContainer Virtualization
dc.subjectDocker
dc.subjectSecurity
dc.subjectMonitoring
dc.subjectAnomalous Behavior
dc.subjectSystem Call Tracing
dc.titleRule-based Security Monitoring of Containerized Workloads
dc.typeconference
dc.typeConference Proceeding
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000571051500060&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.date-start2019-05-02
plymouth.date-finish2019-05-04
plymouth.conference-name9th International Conference on Cloud Computing and Services Science
plymouth.publication-statusPublished
plymouth.journalProceedings of the 9th International Conference on Cloud Computing and Services Science
dc.identifier.doi10.5220/0007770005430550
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2019-01-01
dc.rights.embargodate2023-2-23
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.5220/0007770005430550
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV