2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference O 2020
DOI: 10.1109/cscloud-edgecom49738.2020.00018
|View full text |Cite
|
Sign up to set email alerts
|

Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Miscon iguration of containers or container runtime, as well as the default privileges container runtimes, have led to privilege escalation in the host system and the eventual compromise of it. The namespace feature of the kernel can also be exploited through namespace injec-tion [27], which allows a malicious container to piggyback the hosts' isolation process and see the victim container's PID space just as the host can. In this section, we will delve into one case of container escape in detail and analyze some attacks targeting the containerization process.…”
Section: Cyberattacks On Containersmentioning
confidence: 99%
“…Miscon iguration of containers or container runtime, as well as the default privileges container runtimes, have led to privilege escalation in the host system and the eventual compromise of it. The namespace feature of the kernel can also be exploited through namespace injec-tion [27], which allows a malicious container to piggyback the hosts' isolation process and see the victim container's PID space just as the host can. In this section, we will delve into one case of container escape in detail and analyze some attacks targeting the containerization process.…”
Section: Cyberattacks On Containersmentioning
confidence: 99%
“…The security of developed web portal should be evaluated using a variety of testing techniques [16,17]. Advanced malware [18,19] impact on web applications can a good scope of future research.…”
Section: Security Challengesmentioning
confidence: 99%
“…They demonstrate the suitability of their system using factors such as time-to-deploy, resource usage, and training metrics. Wonjun Lee et al have incorporated containers to train machine learning models that are tasked with identifying kernel-level rootkits in a system [27]. provides a layer of reproducible abstraction for Linux [29].…”
Section: Related Workmentioning
confidence: 99%