期刊文献+

基于OpenStack云平台的Docker容器安全监测方法研究 被引量:4

Research on security monitoring method of Docker container engine based on OpenStack cloud platform
下载PDF
导出
摘要 随着虚拟化技术和容器技术的兴起,容器安全问题引起了社会和企业的广泛重视。针对传统的监控方式对Docker容器信息监控不全面、易产生监控黑洞等问题,提出一种针对OpenStack云平台下的Docker容器安全监测方法,该方法针对性强,资源占用率小,除了实现传统监测功能外,通过采用Logistic-ARMA预警模型和BERT序列标注,还可以实现对DoS攻击、容器逃逸等恶意攻击的有效监测,且根据容器规模不同可实现自定义的预警功能。经过实验验证,该方法在大规模容器网络中威胁预测准确率可达85%以上。 With the rise of virtualization technology and container technology,container security has attracted extensive attention of society and enterprises.In view of the problems that the traditional monitoring method does not fully monitor the Docker container information and is easy to produce monitoring black holes,this paper proposes a Docker container security monitoring method under the OpenStack cloud platform.This method has strong pertinence and low resource occupancy.In addition to realizing the traditional monitoring function,this methocl can effectively monitor the malicious attacks such as DoS attack and container escape by using the Logistic-ARMA warning model and BERT sequence annotation,and realize the customized early warning functions according to different container sizes.Experimental results show that the accuracy of threat prediction in large-scale container networks can reach more than 85%.
作者 崔轲 燕玮 刘子健 张慕榕 贾星威 许凤凯 Cui Ke;Yan Wei;Liu Zijian;Zhang Murong;Jia Xingwei;Xu Fengkai(National Computer System Engineering Research Institute of China,Beijing 100083,China)
出处 《信息技术与网络安全》 2022年第4期65-70,共6页 Information Technology and Network Security
基金 国防基础科研计划(JCKY2020211B005)。
关键词 Docker容器 Logistic-ARMA Bert序列标注 大规模容器网络 Docker container Logistic-ARMA Bert sequence annotation large scale container network
  • 相关文献

参考文献3

二级参考文献12

  • 1薛海峰,卿斯汉,张焕国.XEN虚拟机分析[J].系统仿真学报,2007,19(23):5556-5558. 被引量:20
  • 2Xavier M G, Neves M V, Rossi F D, et al. Performance evalua- tion of container-based virtualization for high performance computing environments[ C ]//Proc of 21 st Euromicro interna- tional conference on parallel, distributed and network-based processing. [ s. 1. ] : IEEE ,2013:233-240.
  • 3Soltesz S, Pfitzl H, Fiuczynski M E, et al. Container-based op- erating system virtualization : a scalable, high-performance al- ternative to hypervisors [ J ]. ACM SIGOPS Operating Systems Review,2007,41 (3) :275-287.
  • 4Vaughan-Niehols S J. New approach to virtualization is a lightweight [ J ]. Computer,2006,39 ( 11 ) : 12-14.
  • 5Deshane T, Shepherd Z, Matthews J, et al. Quantitative com- parison of Xen and KVM [ M ]. Boston, MA, USA : Xen Sum- mit, 2008.
  • 6Zheng Y,Nicol D M. A virtual time system for openvz-based network emulations [ C ]//Proc of IEEE workshop on princi- ples of advanced and distributed simulation. [ s. 1. ] : IEEE, 2011.
  • 7Biederman E, Networx L. Multiple instances of the global Linux namespaces [ C ]//Proceedings of the Linux symposium. Is. 1. ] :Is. n. ] ,2006.
  • 8金海,廖小飞.面向计算系统的虚拟化技术[J].中国基础科学,2008,10(6):12-18. 被引量:25
  • 9吴革,李健,赖英旭.基于操作系统容器虚拟化技术的JBS模型的研究[J].网络安全技术与应用,2010(4):39-41. 被引量:3
  • 10丘诗雅.基于应用虚拟化技术的安全移动办公解决方案[J].移动通信,2011,35(17):66-68. 被引量:9

共引文献76

同被引文献35

引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部