Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A study on analysis and detection of container escape vulnerabilities in Docker
Download
10655034.pdf
Date
2024-7-22
Author
Aktolga, İlter Taha
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
186
views
876
downloads
Cite This
In the rapidly evolving landscape of cloud computing, containerization technologies like Docker have become essential for efficient application deployment and scalability. However, this widespread adoption has also introduced significant security challenges, particularly the threat of container escape vulnerabilities. These vulnerabilities enable malicious actors to breach the isolation of a container, potentially gaining unauthorized access to the host system or other containers, thus posing severe risks to cloud infrastructure security. This thesis provides a comprehensive analysis of container escape vulnerabilities within Docker environments, focusing on critical Common Vulnerabilities and Exposures (CVEs). The research emphasizes the implementation of proof of concepts on ARM-based architectures to demonstrate the feasibility and implications of these vulnerabilities on alternative hardware platforms. Utilizing system call logging with Auditd and a rule-based log analysis methodology, the study offers a structured approach to detect and understand the nature of malicious activities. Key contributions of this research include the successful adaptation of PoCs for ARM devices, detailed system call analysis during vulnerability exploitation, and the development of rule-based detection mechanisms for identifying anomalous patterns indicative of container escapes. These findings significantly advance the field of container security by providing empirical evidence and methodological advancements aimed at enhancing defenses against container escape attacks. The thesis concludes with a discussion on the implications of the findings, highlighting the necessity for robust security measures in containerized systems and proposing directions for future research to address the evolving threat landscape.
Subject Keywords
Container security
,
Docker
,
Container escape
,
System call logging
,
Rule-based anomaly detection
URI
https://hdl.handle.net/11511/110423
Collections
Graduate School of Natural and Applied Sciences, Thesis
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
İ. T. Aktolga, “A study on analysis and detection of container escape vulnerabilities in Docker,” M.S. - Master of Science, Middle East Technical University, 2024.