An Analysis of Security Vulnerabilities in Container Images for Scientific Data Analysis

10/27/2020
by   Bhupinder Kaur, et al.
0

Software containers greatly facilitate the deployment and reproducibility of scientific data analyses on high-performance computing clusters (HPC). However, container images often contain outdated or unnecessary software packages, which increases the number of security vulnerabilities in the images and widens the attack surface of the infrastructure. This paper presents a vulnerability analysis of container images for scientific data analysis. We compare results obtained with four vulnerability scanners, focusing on the use case of neuroscience data analysis, and quantifying the effect of image update and minification on the number of vulnerabilities. We find that container images used for neuroscience data analysis contain hundreds of vulnerabilities, that software updates remove about two thirds of these vulnerabilities, and that removing unused packages is also effective. We conclude with recommendations on how to build container images with a reduced amount of vulnerabilities.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/04/2020

Vulnerability Analysis of 2500 Docker Hub Images

The use of container technology has skyrocketed during the last few year...
research
11/30/2018

On The Relation Between Outdated Docker Containers, Severity Vulnerabilities and Bugs

Packaging software into containers is becoming a common practice when de...
research
07/16/2020

Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation

By leveraging the principle of software polyculture to ensure security i...
research
03/19/2022

An Exploratory Study into Vulnerability Chaining Blindness Terminology and Viability

To tie together the concepts of linkage blindness and the inability to l...
research
10/20/2022

PREPRINT: Do OpenSSF Scorecard Practices Contribute to Fewer Vulnerabilities?

Due to the ever-increasing security breaches, practitioners are motivate...
research
12/04/2018

JOVIAL: Notebook-based Astronomical Data Analysis in the Cloud

Performing astronomical data analysis using only personal computers is b...
research
10/30/2020

Evaluation of vulnerability reproducibility in container-based Cyber Range

A cyber range, a practical and highly educational information security e...

Please sign up or login with your details

Forgot password? Click here to reset