DFScan: Security Scanner of the Dockerfile Based on Instruction Coverage and Attack Perspective

被引:1
|
作者
Hao, Jiawei [1 ]
Lu, Hui [1 ]
Jiang, Yu [1 ]
Gupta, Brij B. [2 ,3 ,4 ,5 ,6 ]
Almomani, Ammar [4 ,7 ]
Zhang, Man [8 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[2] Asia Univ, Int Ctr AI & Cyber Secur Res & Innovat, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] Lebanese Amer Univ, Dept Elect & Comp Engn, Beirut, Lebanon
[4] Skyline Univ Coll, Sch Comp, Sharjah, U Arab Emirates
[5] Symbiosis Int Univ, Symbiosis Ctr Informat Technol SCIT, Pune, India
[6] Univ Petr Energy Studies UPES, Ctr Interdisciplinary Res, Dehra Dun, India
[7] Al Balqa Appl Univ, Al Huson Univ Coll, IT Dept, Irbid, Jordan
[8] PENG CHENG Lab, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Dockfile; Docker Security; DFScan; Instruction Coverage; Attack Perspective;
D O I
10.22967/HCIS.2024.14.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cloud technology's development and widespread use, container technology plays an essential role in the Internet-of-Things field. However, containers also face security threats, mainly due to the ever-looming security flaw of a Dockerfile with the entire lifecycle of a docker, while previous Dockerfile scanning solutions are not enough. They mainly focus on the grammar problems of a Dockerfile or the reason for the build error, or just focus on package security in it. To solve the problem of insufficient security-scanning capabilities, we introduce DFScan-a Dockerfile security scanning system to complement existing scanning capabilities. We transform the raw content of a Dockerfile into structured data and design appropriate analysis rules to extract potential vulnerabilities based on existing best practices and container attack tools. Based on DFScan, we analyzed the security problems of 10,064 Dockerfile projects with a high STAR ranking in GitHub for more than 30 mainstream risk types, and the results have shown that more than 90% of the projects suffer from at least one security risk. Moreover, DFScan has a higher problem coverage and more inspection types than Hadolint, DAYS, and Shipwright.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Attack Pattern Mining Algorithm Based on Security Log
    Li, Keyi
    Li, Yang
    Liu, Jianyi
    Zhang, Ru
    Duan, Xi
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 205 - 205
  • [22] An attack graph-based probabilistic security metric
    Wang, Lingyu
    Islam, Tania
    Long, Tao
    Singhal, Anoop
    Jajodia, Sushil
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 283 - +
  • [23] A Security Event Correlation Algorithm Based On Attack Sequence
    Zhang Dedong
    Wang Hongwei
    Feng Kailiang
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 81 - 86
  • [24] Heuristic Network Security Risk Based on Attack Graph
    Sun, Wei
    Li, Qianmu
    Wang, Pengchuan
    Hou, Jun
    CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
  • [25] Security Measurement for Unknown Threats Based on Attack Preferences
    Yin, Lihua
    Sun, Yanwei
    Wang, Zhen
    Guo, Yunchuan
    Li, Fenghua
    Fang, Binxing
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [26] Host security assessment method based on attack graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99
  • [27] An active attack on the token-based security protocol
    Abdelshafy, M.A.
    Elsaholy, M.S.
    Darwish, M.G.
    Journal of Engineering and Applied Science, 2001, 48 (02): : 365 - 383
  • [29] Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP
    Kuhn, MG
    IEEE TRANSACTIONS ON COMPUTERS, 1998, 47 (10) : 1153 - 1157
  • [30] XSS Attack Detection and Prevention System Based on Instruction Set Randomization
    Wang, Qijin
    Huang, Jun
    Qi, Xiaoxia
    2019 INTERNATIONAL CONFERENCE ON ADVANCED ELECTRONIC MATERIALS, COMPUTERS AND MATERIALS ENGINEERING (AEMCME 2019), 2019, 563