期刊文献+

Docker容器漏洞的逃逸攻击研究

Research on Docker Breakout Attack and Defense of Docker Container Vulnerabilities
下载PDF
导出
摘要 随着计算机技术的发展,Docker容器技术具有宿主部署特性,广泛应用到互联网服务中,但软件漏洞引起信息安全问题比较突出。对Docker容器的部署和应用进行了探究,与传统虚拟机技术对比了技术架构和资源应用上的优势。应用虚拟机、镜像部署模拟实际环境,构建一套完整的网络入侵流程,利用Docker高危漏洞CVE-2020-15257、CVE-2019-5736开展入侵实验,实现容器逃逸并获得宿主主机的高级权限。实验方法有效反映Docker网络入侵的破坏力和安全问题。 With the advancement of computer technology,Docker container technology is known for its host deployment characteristics,has found widespread application in internet services.However,the prominence of information security issues arising from software vulnerabilities cannot be overlooked.This research explores the deployment and application of Docker containers,comparing their technical architecture and resource utilization advantages with traditional virtual machine technology.By deploying virtual machines and image simulations to replicate real-world environments,a comprehensive network intrusion process is constructed.Intrusion experiments are carried out using high-risk Docker vulnerabilities,namely CVE-2020-15257 and CVE-2019-5736,resulting in container escape and the acquisition of elevated privileges on the host machine.
机构地区 绍兴市公安局
出处 《工业控制计算机》 2024年第7期99-100,共2页 Industrial Control Computer
关键词 网络安全 软件漏洞 Docker逃逸 网络入侵 network security software vulnerabilities Docker escape network intrusion
  • 相关文献

参考文献11

二级参考文献78

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部