2022
DOI: 10.1155/2022/6819002
|View full text |Cite
|
Sign up to set email alerts
|

Container Performance and Vulnerability Management for Container Security Using Docker Engine

Abstract: Containers have evolved to support microservice architecture as a low-cost alternative to virtual machines. Containers are increasingly prevalent in the virtualization landscape because of better working; containers can bear considerably less overhead than the conventional hypervisor-based component virtual machines. However, containers directly communicate with the host kernel, and attackers can co-locate containers in the host system quicker than virtual machines. This causes significant security issues in c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…This may include a web-based interface, mobile app, or wearable device. Emotion Detection and Analysis Algorithms: This includes algorithms that are used to detect and interpret the user's emotional state [5]. These algorithms may be implemented on the wearable devices or on the cloud server.…”
Section: Integration Of Cloud Computing and Wearable Technology For E...mentioning
confidence: 99%
See 2 more Smart Citations
“…This may include a web-based interface, mobile app, or wearable device. Emotion Detection and Analysis Algorithms: This includes algorithms that are used to detect and interpret the user's emotional state [5]. These algorithms may be implemented on the wearable devices or on the cloud server.…”
Section: Integration Of Cloud Computing and Wearable Technology For E...mentioning
confidence: 99%
“…This research is exploring new approaches and solutions for integrating cloud technology and wearable computing, including new hardware and software designs, improved communication protocols, and enhanced security mechanisms. The goal is to create wearable devices that are better connected to cloud-based resources and provide users with a more integrated and personalized computing experience [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Saket Acharya et al [28] provided a comprehensive review of recent Android security concerns, improvements in security implementation, notable malware detected from 2017 to 2021, and the privacy techniques employed by malware developers, along with the current methods of detecting Android malware. On the other hand, Tahir Alyas et al [29] proposed using Docker Security Engine (DSE) for container protection, employing container execution and vulnerability management. DSE implements four mechanisms: innovative gathering and supplementary rules to enhance container runtime and enforce container capacity, signifying claims in preparation, procedures, file system scanning, network isolation, and Docker image capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…The following detection model has been studied in this paper [4] • The investigation findings into the Attention Residual Network-based Visualization model show that the proposed method for identifying RGB and grayscale images has a greater accuracy rate. [5] •…”
Section: Malware Attacks Detection In Network Security Using Deepmentioning
confidence: 99%