2020
DOI: 10.46460/ijiea.617181
|View full text |Cite
|
Sign up to set email alerts
|

Securing Vulnerabilities in Docker Images

Abstract: Review PaperDocker is an alternative application development and publishing infrastructure tool to various virtualization environments such as Virtual box and the like. The most popular containerization platform is Docker which is the area where Docker images are run. Container is a lightweight contrasting option to full machine virtualization that includes exemplifying an application in a container with its own working condition. These two concepts, virtualization and containerization are competing in the clo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 12 publications
0
0
0
1
Order By: Relevance
“…The survey results extend the knowledge from industry to literature, adding details about the testing methods used. Moreover, the survey results confirm the common use of tools, diverse needs and corresponding methods and tools [1,7,16], concerns about security and vulnerabilities [4,5,3,17], the importance of automation and CI/CD implementations and dynamic program analysis [16], and the need for further knowledge and research [6].…”
Section: Discussionmentioning
confidence: 55%
See 1 more Smart Citation
“…The survey results extend the knowledge from industry to literature, adding details about the testing methods used. Moreover, the survey results confirm the common use of tools, diverse needs and corresponding methods and tools [1,7,16], concerns about security and vulnerabilities [4,5,3,17], the importance of automation and CI/CD implementations and dynamic program analysis [16], and the need for further knowledge and research [6].…”
Section: Discussionmentioning
confidence: 55%
“…Another article from 2021 [16] investigates the accuracy of container scanning tools and highlights the vulnerability of the container's operating system. Additional mitigation strategies involve implementing strong access controls and ensuring containers remain lightweight [17].…”
Section: Container Testing Approachesmentioning
confidence: 99%
“…Adanya container pada Docker memberikan banyak kemudahan, akan tetapi perlu diperhatikan mengenai keamanan, kerentanan dan risiko dari penggunaannya. Seiring berjalannya waktu, laju pertumbuhan pada teknologi Docker meningkat sangat pesat [3]. Peningkatan pesat ini terjadi antara tahun 2015 sampai 2017.…”
Section: Pendahuluanunclassified