Lic-Sec: an enhanced AppArmor Docker security profile generator

09/24/2020
by   Hui Zhu, et al.
0

Along with the rapid development of cloud computing technology, containerization technology has drawn much attention from both industry and academia. In this paper, we perform a comparative measurement analysis of Docker-sec, which is a Linux Security Module proposed in 2018, and a new AppArmor profile generator called Lic-Sec, which combines Docker-sec with a modified version of LiCShield, which is also a Linux Security Module proposed in 2015. Docker-sec and LiCShield can be used to enhance Docker container security based on mandatory access control and allows protection of the container without manually configurations. Lic-Sec brings together their strengths and provides stronger protection. We evaluate the effectiveness and performance of Docker-sec and Lic-Sec by testing them with real-world attacks. We generate an exploit database with 42 exploits effective on Docker containers selected from the latest 400 exploits on Exploit-db. We launch these exploits on containers spawned with Docker-sec and Lic-Sec separately. Our evaluations show that for demanding images, Lic-Sec gives protection for all privilege escalation attacks for which Docker-sec failed to give protection.

READ FULL TEXT
research
12/14/2018

Data Security and Privacy Protection Data Security and Privacy Protection in Public Cloud

This paper discusses about the challenges, advantages and shortcomings o...
research
11/16/2020

Improved hierarchical role based access control model for cloud computing

Cloud computing is considered as the one of the most dominant paradigm i...
research
06/10/2021

Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again

The security of a computer system depends on OS kernel protection. It is...
research
05/31/2020

Phishing and Spear Phishing: examples in Cyber Espionage and techniques to protect against them

Phishing attacks have become the most used technique in the online scams...
research
11/10/2020

Guarding Serverless Applications with SecLambda

As an emerging application paradigm, serverless computing attracts atten...
research
07/17/2017

Downgrade Attack on TrustZone

Security-critical tasks require proper isolation from untrusted software...
research
11/11/2020

Security in biometric systems

The objective of biometric systems is to provide an identification mecha...

Please sign up or login with your details

Forgot password? Click here to reset