DFScan: Security Scanner of the Dockerfile Based on Instruction Coverage and Attack Perspective

被引:1
|
作者
Hao, Jiawei [1 ]
Lu, Hui [1 ]
Jiang, Yu [1 ]
Gupta, Brij B. [2 ,3 ,4 ,5 ,6 ]
Almomani, Ammar [4 ,7 ]
Zhang, Man [8 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[2] Asia Univ, Int Ctr AI & Cyber Secur Res & Innovat, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] Lebanese Amer Univ, Dept Elect & Comp Engn, Beirut, Lebanon
[4] Skyline Univ Coll, Sch Comp, Sharjah, U Arab Emirates
[5] Symbiosis Int Univ, Symbiosis Ctr Informat Technol SCIT, Pune, India
[6] Univ Petr Energy Studies UPES, Ctr Interdisciplinary Res, Dehra Dun, India
[7] Al Balqa Appl Univ, Al Huson Univ Coll, IT Dept, Irbid, Jordan
[8] PENG CHENG Lab, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Dockfile; Docker Security; DFScan; Instruction Coverage; Attack Perspective;
D O I
10.22967/HCIS.2024.14.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cloud technology's development and widespread use, container technology plays an essential role in the Internet-of-Things field. However, containers also face security threats, mainly due to the ever-looming security flaw of a Dockerfile with the entire lifecycle of a docker, while previous Dockerfile scanning solutions are not enough. They mainly focus on the grammar problems of a Dockerfile or the reason for the build error, or just focus on package security in it. To solve the problem of insufficient security-scanning capabilities, we introduce DFScan-a Dockerfile security scanning system to complement existing scanning capabilities. We transform the raw content of a Dockerfile into structured data and design appropriate analysis rules to extract potential vulnerabilities based on existing best practices and container attack tools. Based on DFScan, we analyzed the security problems of 10,064 Dockerfile projects with a high STAR ranking in GitHub for more than 30 mainstream risk types, and the results have shown that more than 90% of the projects suffer from at least one security risk. Moreover, DFScan has a higher problem coverage and more inspection types than Hadolint, DAYS, and Shipwright.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] A Logic-based Attack Graph for Analyzing Network Security Risk Against Potential Attack
    Yi, Feng
    Cai, Huang Yi
    Xin, Fu Zheng
    2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [42] RESEARCH ON SECURITY EVALUATION OF CLOUD COMPUTING BASED ON ATTACK GRAPH
    Cheng, Yexia
    Du, Yuejin
    Xu, Junfeng
    Yuan, Chunyang
    Xue, Zhi
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 459 - 465
  • [43] Mobile Agent based Security in MANETS against Sybil Attack
    Aranganathan, A.
    Suriyakala, C. D.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1338 - 1342
  • [44] An Approach for Internal Network Security Metric Based on Attack Probability
    Shan, Chun
    Jiang, Benfu
    Xue, Jingfeng
    Guan, Fang
    Xiao, Na
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [45] Authentication Protocol Security Assessment Framework Based on Attack Classification
    Wang, Hao
    Tan, Guozhen
    Liu, Lidong
    ELECTRICAL INFORMATION AND MECHATRONICS AND APPLICATIONS, PTS 1 AND 2, 2012, 143-144 : 859 - +
  • [46] Targeted attack and security enhancement on texture synthesis based steganography
    Zhou, Hang
    Chen, Kejiang
    Zhang, Weiming
    Qian, Zhenxing
    Yu, Nenghai
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 54 : 100 - 107
  • [47] An approach to evaluate network security risk based on attack graph
    Hu, Xiaoyun
    Yu, Yang
    Xia, Chunhe
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
  • [48] Quantitative Method for Network Security Situation Based on Attack Prediction
    Hu, Hao
    Zhang, Hongqi
    Liu, Yuling
    Wang, Yongwei
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [49] A Comparison of ICS Datasets for Security Research Based on Attack Paths
    Choi, Seungoh
    Yun, Jeong-Han
    Kim, Sin-Kyu
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2018), 2019, 11260 : 154 - 166
  • [50] Study of network security evaluation based on attack graph model
    Electronic Engineering Institute, Hefei 230037, China
    不详
    Tongxin Xuebao, 2007, 3 (29-34):