[1] |
GAO X , GU Z , KAYAALP M ,et al. ContainerLeaks:Emerging security threats of information leakages in container clouds[C]// 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 2017: 237-248.
|
[2] |
COMBE T , MARTIN A , DI PIETRO R . To docker or not to docker:A security perspective[J]. IEEE Cloud Computing, 2016,3(5): 54-62.
|
[3] |
SHU R , GU X , ENCK W . A study of security vulnerabilities on docker hub[C]// Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. 2017: 269-280.
|
[4] |
周天昱, 申文博, 杨男子 ,等. Docker组件间标准输入输出复制的DoS攻击分析[J]. 网络与信息安全学报, 2020,6(6): 45-56.
|
|
ZHOU T Y , SHEN W B , YANG N Z ,et al. Analysis of DoS attacks on Docker inter-component stdio copy[J]. Chinese Journal of Network and Information Security, 2020,6(6): 45-56.
|
[5] |
MARTIN A , RAPONI S , COMBE T ,et al. Docker ecosystem–vulnerability analysis[J]. Computer Communications, 2018,122: 30-43.
|
[6] |
FLORA J , ANTUNES N . Studying the applicability of intrusion detection to multi-tenant container environments[C]// 2019 15th European Dependable Computing Conference (EDCC). 2019: 133-136.
|
[7] |
MANU A R , PATEL J K , AKHTAR S ,et al. A study,analysis and deep dive on cloud PaaS security in terms of Docker container security[C]// 2016 international conference on circuit,power and computing technologies (ICCPCT). 2016: 1-13.
|
[8] |
YASRAB R . Mitigating docker security issues[J]. arXiv preprint arXiv:1804.05039, 2018.
|
[9] |
ALARIFI S S , WOLTHUSEN S D . Detecting anomalies in IaaS environments through virtual machine host system call analysis[C]// 2012 International Conference for Internet Technology and Secured Transactions. 2012: 211-218.
|
[10] |
MASKE S A , PARVAT T J . Advanced anomaly intrusion detection technique for host based system using system call patterns[C]// 2016 International Conference on Inventive Computation Technologies (ICICT). 2016,2: 1-4.
|
[11] |
JIAN Z , CHEN L . A defense method against docker escape attack[C]// Proceedings of the 2017 International Conference on Cryptography,Security and Privacy. 2017: 142-146.
|
[12] |
FORREST S , HOFMEYR S A , SOMAYAJI A ,et al. A sense of self for unix processes[C]// Proceedings 1996 IEEE Symposium on Security and Privacy. 1996: 120-128.
|
[13] |
WARRENDER C , FORREST S , PEARLMUTTER B . Detecting intrusions using system calls:alternative data models[C]// Proceedings of the 1999 IEEE symposium on security and privacy (Cat.No.99CB36344). 1999: 133-145.
|
[14] |
HOFMEYR S A , FORREST S , SOMAYAJI A . Intrusion detection using sequences of system calls[J]. Journal of computer security, 1998,6(3): 151-180.
|
[15] |
KANG D K , FULLER D , HONAVAR V . Learning classifiers for misuse and anomaly detection using a bag of system calls representation[C]// Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop. 2005: 118-125.
|
[16] |
ABED A S , CLANCY C , LEVY D S . Intrusion detection system for applications using linux containers[C]// International Workshop on Security and Trust Management. 2015: 123-135.
|
[17] |
SRINIVASAN S , KUMAR A , MAHAJAN M ,et al. Probabilistic real-time intrusion detection system for docker containers[C]// International Symposium on Security in Computing and Communication. 2018: 336-347.
|
[18] |
KHREICH W , KHOSRAVIFAR B , HAMOU-LHADJ A , ,et al. An anomaly detection system based on variable N-gram features and one-class SVM[J]. Information and Software Technology, 2017,91: 186-197.
|
[19] |
董玲, 张宏莉, 叶麟 . 基于系统调用序列分析入侵检测的层次化模型[J]. 智能计算机与应用, 2014,4(4): 13-16.
|
|
DONG L , ZHANG H L , YE L . A new study of the system call sequence analysis method[J]. Intelligent Computer and Applications, 2014,4(4): 13-16.
|
[20] |
张东, 张尧, 刘刚 ,等. 基于机器学习算法的主机恶意代码检测技术研究[J]. 网络与信息安全学报, 2017,3(7): 25-32.
|
|
ZHANG D , ZHANG Y , LIU G ,et al. Research on host malcode detection using machine learning[J]. Chinese Journal of Network and Information Security, 2017,3(7): 25-32.
|
[21] |
AZAB M , MOKHTAR B M , ABED A S ,et al. Smart moving target defense for linux container resiliency[C]// 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC). 2016: 122-130.
|