Derleme

Securing Vulnerabilities in Docker Images

Cilt: 4 Sayı: 1 29 Haziran 2020
Ahmet Efe , Ulaş Aslan , Aytekin Mutlu Kara
PDF İndir
EN

Securing Vulnerabilities in Docker Images

Öz

Docker is an alternative application development and publishing infrastructure tool to various virtualization environments such as Virtual box and the like. The most popular containerization platform is Docker which is the area where Docker images are run. Container is a lightweight contrasting option to full machine virtualization that includes exemplifying an application in a container with its own working condition. These two concepts, virtualization and containerization are competing in the cloud-based environments. When virtualization became the mainstream, VM security concerns was common. IT Security experts are discussing the potential weaknesses of a virtualized environment for a long time. In this paper, focusing on Docker container, its vulnerabilities and possible measurements against security concerns, we have provided information about assessment of risks and vulnerabilities of containerization and the main differences between these two concepts via vulnerability analysis. 

Anahtar Kelimeler

Technology,Vulnerabilities,Dockers,Containers

Kaynakça

  1. [1] Wikipadiea Docker. (n.d.). Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Docker_(software)
  2. [2] What is Docker? (n.d.). Retrieved from opensource.com: https://opensource.com/resources/what-docker
  3. [3] Docker Security Vulnerabilities. (n.d.). Retrieved from Sysdig: https://sysdig.com/blog/7-docker-security-vulnerabilities/
  4. [4] Five Security concerns when using docker. (n.d.). Retrieved from Oreilly: https://www.oreilly.com/ideas/five-security-concerns-when-using-docker
  5. [5] Rui, S., Xiaohui, G., & William, E. (March 22 - 24, 2017). A Study of Security Vulnerabilities on Docker Hub. CODASPY '17 Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (pp. 269-280). Scottsdale, Arizona, USA: ACM.
  6. [6] ISACA, Understanding the Enterprise Advantages of Application Containerization. (n.d.). USA.
  7. [7] Docker Website. (n.d.). Retrieved from Docker Website: https://www.docker.com/
  8. [8] Twistlock. (n.d.). Retrieved from 5 Best Practices to Container Image Security: https://www.twistlock.com/2017/08/31/container-image-security-best-practices/
  9. [9] Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities. (n.d.). Retrieved from banyanops: https://banyanops.com/blog/analyzing-docker-hub/Advantages-of-Application-Containerization.aspx
  10. [10] Federacy. (n.d.). Retrieved from Container Scanning Specification: https://www.federacy.org/docker_image_vulnerabilities

Kaynak Göster

APA
Efe, A., Aslan, U., & Kara, A. M. (2020). Securing Vulnerabilities in Docker Images. International Journal of Innovative Engineering Applications, 4(1), 31-39. https://doi.org/10.46460/ijiea.617181
AMA
1.Efe A, Aslan U, Kara AM. Securing Vulnerabilities in Docker Images. ijiea, IJIEA. 2020;4(1):31-39. doi:10.46460/ijiea.617181
Chicago
Efe, Ahmet, Ulaş Aslan, ve Aytekin Mutlu Kara. 2020. “Securing Vulnerabilities in Docker Images”. International Journal of Innovative Engineering Applications 4 (1): 31-39. https://doi.org/10.46460/ijiea.617181.
EndNote
Efe A, Aslan U, Kara AM (01 Haziran 2020) Securing Vulnerabilities in Docker Images. International Journal of Innovative Engineering Applications 4 1 31–39.
IEEE
[1]A. Efe, U. Aslan, ve A. M. Kara, “Securing Vulnerabilities in Docker Images”, ijiea, IJIEA, c. 4, sy 1, ss. 31–39, Haz. 2020, doi: 10.46460/ijiea.617181.
ISNAD
Efe, Ahmet - Aslan, Ulaş - Kara, Aytekin Mutlu. “Securing Vulnerabilities in Docker Images”. International Journal of Innovative Engineering Applications 4/1 (01 Haziran 2020): 31-39. https://doi.org/10.46460/ijiea.617181.
JAMA
1.Efe A, Aslan U, Kara AM. Securing Vulnerabilities in Docker Images. ijiea, IJIEA. 2020;4:31–39.
MLA
Efe, Ahmet, vd. “Securing Vulnerabilities in Docker Images”. International Journal of Innovative Engineering Applications, c. 4, sy 1, Haziran 2020, ss. 31-39, doi:10.46460/ijiea.617181.
Vancouver
1.Ahmet Efe, Ulaş Aslan, Aytekin Mutlu Kara. Securing Vulnerabilities in Docker Images. ijiea, IJIEA. 01 Haziran 2020;4(1):31-9. doi:10.46460/ijiea.617181