Evaluating Docker Container Security through Penetration Testing: A Smart Computer Security | IEEE Conference Publication | IEEE Xplore

Evaluating Docker Container Security through Penetration Testing: A Smart Computer Security


Abstract:

The widespread adoption of containerization, exemplified by Docker, has transformed software deployment, enabling agile applications. However, its popularity invites mali...Show More

Abstract:

The widespread adoption of containerization, exemplified by Docker, has transformed software deployment, enabling agile applications. However, its popularity invites malicious exploits, heightening security incidents in containerized environments. This paper details a comprehensive penetration testing approach for Docker container security, spotlighting file system vulnerabilities and artifacts. Using penetration testing methodologies, the study systematically scrutinizes Docker container file systems. Detection of Common Vulnerabilities and Exposures (CVEs) and Common Exploit Weaknesses (CEWs) within the file system identifies potential attacker entry points. The paper also delves into artifact extraction from the file system, encompassing logs, configurations, and command traces. These artifacts unveil the container's activities, shedding light on potential intrusion vectors. Examination of container metadata and configurations uncovers misconfigurations and potential attack surfaces. By Exploration of file system vulnerabilities and artifacts equips security practitioners with crucial insights for bolstering Docker container defense.
Date of Conference: 23-25 November 2023
Date Added to IEEE Xplore: 16 February 2024
ISBN Information:
Conference Location: Greater Noida, India

I. Introduction

The concept of Docker containerization has become a cornerstone in modern software development and deployment. A Docker container represents a self-contained, lightweight, and executable software package that encapsulates all the essential components required to run a specific application [1]. This package encompasses not only the application's code but also its runtime, libraries, environment variables, and system tools, providing a self- sufficient environment for seamless execution. The key advantage of Docker containers lies in their utilization of OS- level virtualization, granting them the ability to create consistent and isolated environments. This, in turn, facilitates the development, deployment, and management of applications across diverse systems. Notably, containers bestow the process isolation feature, confining applications within sandboxes to prevent interference with the underlying system or other containers. Consequently, an application's dependencies and configurations remain segregated, ensuring operational stability and security.

Contact IEEE to Subscribe

References

References is not available for this document.