期刊文献+

面向云容器安全的异常检测技术研究综述 被引量:1

Survey of Cloud Container Security Oriented Anomaly Detection Technology
下载PDF
导出
摘要 随着云计算的快速发展,容器技术越来越多地引起广泛关注。同时容器也面临着很多安全风险而且对容器入侵检测技术的研究尚处于探索研究阶段。本文从云容器的背景技术出发,分析了容器安全领域中面临的各种风险问题,进而从容器漏洞、主机、网络3个层面论述了容器异常入侵检测技术的最新发展和在容器安全领域中的深入应用。另外,本文归纳了容器安全领域中面向深度学习算法的数据集现状以及现用的容器安全商业解决方案,最后,展望了异常检测技术在容器安全领域的发展趋势和应用前景。 With the rapid development of cloud computing,container technology is attracting wide attentions.However,containers also face many unknown security risks,the research on container intrusion detection technology is still in the preliminary exploration stage.This paper analyzes the various risks in the container security field on the basis of the background technology of cloud container,and further discusses the latest development of container anomaly intrusion detection technology and its deep-going applications in the container security field from three aspects of container vulnerability,host and network.Moreover,the status of data sets for deep learning algorithms in container security field and the current container security business solutions are summarized.Finally,we very briefly conclude the future trend and application perspectives of anomaly detection technology in the field of container security field.
作者 范源艺 张增军 徐成华 魏育成 蔡刚 朱科键 FAN Yuanyi;ZHANG Zengjun;XU Chenghua;WEI Yucheng;CAI Gang;ZHU Kejian(University of Chinese Academy of Sciences,Beijing,100049 China;Aerospace Information Research Institute,Chinese Academy of Sciences,Beijing,100190 China;GEODO(Beijing),Beijing 100190 China;Shenzhen Research Center of Digital City Engineering,Beijing,100190 China)
出处 《科技创新导报》 2021年第13期118-125,共8页 Science and Technology Innovation Herald
基金 军队后勤科研项目(项目编号:No.BS220R006)。
关键词 云计算 容器安全 异常检测 虚拟化 Cloud computing Container security Anomaly detection Virtualization
  • 相关文献

参考文献4

二级参考文献14

  • 1Wikipedia.Responsible disclosure. https://en.wikipedia.org/wiki/Responsible_disclo-sure . 2015 被引量:1
  • 2Victor Vieux.Announcing Docker 1.2.0. http://blog.docker.com/2014/08/announcing-docker-1-2-0/ . 2014 被引量:1
  • 3Wikipedia.Security-Enhanced Linux. https://en.wikipedia.org/wiki/Security-Enhanced_Linux . 2015 被引量:1
  • 4Docker,Inc.Protect Dockersocket. https://docs.docker.com/articles/ . 2015 被引量:1
  • 5Lantz B,Heller B,McKeown N.A network in a laptop:rapid prototyping for software-defined networks. Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks . 2010 被引量:1
  • 6Docker,Inc.Understand what are the major Docker components. https://docs.docker.com/introduction/understanding-docker . 2015 被引量:1
  • 7Merkel,Dirk.Docker:lightweight linux containers for consistent development and deployment. Linux Journal . 2014 被引量:1
  • 8Docker,Inc.What is Docker. http://www.docker.com/whatisdocker . 2015 被引量:1
  • 9Wikipedia.MAC-Flooding. https://en.wikipedia.org/wiki/MAC-Flooding . 被引量:1
  • 10韩晓光,曲武,姚宣霞,郭长友,周芳.基于纹理指纹的恶意代码变种检测方法研究[J].通信学报,2014,35(8):125-136. 被引量:56

共引文献14

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部