Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

Container security: Issues, challenges, and the road ahead

S Sultan, I Ahmad, T Dimitriou - IEEE access, 2019 - ieeexplore.ieee.org
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better
microservice architecture support. The value of the container market is expected to reach 2.7 …

Docker ecosystem–vulnerability analysis

A Martin, S Raponi, T Combe, R Di Pietro - Computer Communications, 2018 - Elsevier
Cloud based infrastructures have typically leveraged virtualization. However, the need for
always shorter development cycles, continuous delivery and cost savings in infrastructures …

A measurement study on linux container security: Attacks and countermeasures

X Lin, L Lei, Y Wang, J Jing, K Sun… - Proceedings of the 34th …, 2018 - dl.acm.org
Linux container mechanism has attracted a lot of attention and is increasingly utilized to
deploy industry applications. Though it is a consensus that the container mechanism is not …

On the security of containers: Threat modeling, attack analysis, and mitigation strategies

AY Wong, EG Chekole, M Ochoa, J Zhou - Computers & Security, 2023 - Elsevier
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …

A survey on security issues in services communication of Microservices‐enabled fog applications

D Yu, Y Jin, Y Zhang, X Zheng - Concurrency and Computation …, 2019 - Wiley Online Library
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024 - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

Security mechanisms used in microservices-based systems: A systematic mapping

A Pereira-Vale, G Márquez, H Astudillo… - 2019 XLV Latin …, 2019 - ieeexplore.ieee.org
Microservices is an architectural style that conceives systems as a modular, costumer,
independent and scalable suite of services; it offers several advantages but its growing …

SoK: A comprehensive analysis and evaluation of docker container attack and defense mechanisms

MS Haq, TD Nguyen, AŞ Tosun… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Container-based applications are increasingly favored for their efficiency in software
development, deployment, and operation across various platforms. However, the growing …