Please use this identifier to cite or link to this item:
Insight from a Docker Container Introspection
|Title:||Insight from a Docker Container Introspection|
|Keywords:||Cyber Threat Intelligence and Analytics|
Cloud computing, Containers, Introspection, Docker
|Date Issued:||08 Jan 2019|
|Abstract:||Large-scale adoption of virtual containers has stimulated concerns by practitioners and academics about the viability of data acquisition and reliability due to the decreasing window to gather relevant data points. These concerns prompted the idea that introspection tools, which are able to acquire data from a system as it is running, can be utilized as both an early warning system to protect that system and as a data capture system that collects data that would be valuable from a digital forensic perspective. |
An exploratory case study was conducted utilizing a Docker engine and Prometheus as the introspection tool. The research contribution of this research is two-fold. First, it provides empirical support for the idea that introspection tools can be utilized to ascertain differences between pristine and infected containers. Second, it provides the ground work for future research conducting an analysis of large-scale containerized applications in a virtual cloud.
|Rights:||Attribution-NonCommercial-NoDerivatives 4.0 International|
|Appears in Collections:||
Cyber Threat Intelligence and Analytics|
Please email firstname.lastname@example.org if you need this content in ADA-compliant format.
This item is licensed under a Creative Commons License