Secure Inter-Container Communications Using XDP/eBPF

被引:7
|
作者
Nam, Jaehyun [1 ]
Lee, Seungsoo [2 ]
Porras, Phillip [3 ]
Yegneswaran, Vinod [3 ]
Shin, Seungwon [4 ]
机构
[1] Dankook Univ, Dept Comp Engn, Yongin 16890, South Korea
[2] Incheon Natl Univ, Dept Comp Sci & Engn, Incheon 22012, South Korea
[3] SRI Int, Menlo Pk, CA 94025 USA
[4] Korea Adv Inst Sci & Technol, Sch Elect Engn, Daejeon 34141, South Korea
基金
新加坡国家研究基金会;
关键词
Container security; network sandboxing; policy enforcement; security function chaining; XDP/eBPF;
D O I
10.1109/TNET.2022.3206781
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While the use of containerization technologies for virtual application deployment has grown at an astonishing rate, the question of the robustness of container networking has not been well scrutinized from a security perspective, even though inter-container networking is indispensable for microservices. Thus, this paper first analyzes container networks from a security perspective, discussing the implications based on their architectural limitations. Then, it presents Bastion(+), a secure inter-container communication bridge. Bastion(+) introduces (i) a network security enforcement stack that provides fine-grained control per container application and securely isolates intercontainer traffic in a point-to-point manner. Bastion(+) also supports (ii) selective security function chaining, enabling various security functions to be chained between containers for further security inspections (e.g., deep packet inspection) according to the container's network context. Bastion(+) incorporates (iii) a security policy assistant that helps an administrator discover inter-container networking dependencies correctly. Our evaluation demonstrates how Bastion(+) can effectively mitigate several adversarial attacks in container networks while improving the overall performance up to 25.4% within single-host containers and 17.7% for cross-host container communications.
引用
收藏
页码:934 / 947
页数:14
相关论文
共 50 条
  • [21] Secure communications using chaotic digital encoding
    Aislam, T
    Edwards, JA
    ELECTRONICS LETTERS, 1996, 32 (03) : 190 - 191
  • [22] Two Factor Authentication using secure algorithm for Cloud Container
    Onmalwar, Vinit M.
    Kumar, C.N.S. Vinoth
    2024 3rd International Conference for Innovation in Technology, INOCON 2024, 2024,
  • [23] Secure communications using nonlinear silicon photonic keys
    Grubel, Brian C.
    Bosworth, Bryan T.
    Kossey, Michael R.
    Cooper, A. Brinton
    Foster, Mark A.
    Foster, Amy C.
    OPTICS EXPRESS, 2018, 26 (04): : 4710 - 4722
  • [24] Quantum cryptography: Secure communications using quantum physics
    Townsend, Paul
    Phoenix, Simon
    British Telecommunications Engineering, 1997, 16 (03): : 207 - 213
  • [25] Quantum cryptography: Secure communications using quantum physics
    Townsend, P
    Phoenix, S
    BRITISH TELECOMMUNICATIONS ENGINEERING, 1997, 16 : 207 - 213
  • [26] Secure optical communications systems using quantum cryptography
    Townsend, PD
    Marand, C
    Phoenix, SJD
    Blow, KJ
    Barnett, SM
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1996, 354 (1708): : 805 - 817
  • [27] Secure communications using cascaded chaotic optical rings
    Yoshimura, K
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2004, 14 (03): : 1105 - 1113
  • [28] Secure communications using OFDM with chaotic modulation in the subcarriers
    Luengo, D
    Santamaría, I
    VTC2005-SPRING: 2005 IEEE 61ST VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, PROCEEDINGS, 2005, : 1022 - 1026
  • [29] Secure communication using the Mobile communications (cellular telephony)
    Enrique Franklin, Exell J.
    2014 IEEE Fourth International Conference on Consumer Electronics Berlin (ICCE-Berlin), 2014, : 433 - 434
  • [30] Secure Joint Communications and Sensing using Chirp Modulation
    Dwivedi, Saumya
    Zoli, Marco
    Barreto, Andre N.
    Sen, Padmanava
    Fettweis, Gerhard
    2020 2ND 6G WIRELESS SUMMIT (6G SUMMIT), 2020,