Secure Inter-Container Communications Using XDP/eBPF

被引:7
|
作者
Nam, Jaehyun [1 ]
Lee, Seungsoo [2 ]
Porras, Phillip [3 ]
Yegneswaran, Vinod [3 ]
Shin, Seungwon [4 ]
机构
[1] Dankook Univ, Dept Comp Engn, Yongin 16890, South Korea
[2] Incheon Natl Univ, Dept Comp Sci & Engn, Incheon 22012, South Korea
[3] SRI Int, Menlo Pk, CA 94025 USA
[4] Korea Adv Inst Sci & Technol, Sch Elect Engn, Daejeon 34141, South Korea
基金
新加坡国家研究基金会;
关键词
Container security; network sandboxing; policy enforcement; security function chaining; XDP/eBPF;
D O I
10.1109/TNET.2022.3206781
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While the use of containerization technologies for virtual application deployment has grown at an astonishing rate, the question of the robustness of container networking has not been well scrutinized from a security perspective, even though inter-container networking is indispensable for microservices. Thus, this paper first analyzes container networks from a security perspective, discussing the implications based on their architectural limitations. Then, it presents Bastion(+), a secure inter-container communication bridge. Bastion(+) introduces (i) a network security enforcement stack that provides fine-grained control per container application and securely isolates intercontainer traffic in a point-to-point manner. Bastion(+) also supports (ii) selective security function chaining, enabling various security functions to be chained between containers for further security inspections (e.g., deep packet inspection) according to the container's network context. Bastion(+) incorporates (iii) a security policy assistant that helps an administrator discover inter-container networking dependencies correctly. Our evaluation demonstrates how Bastion(+) can effectively mitigate several adversarial attacks in container networks while improving the overall performance up to 25.4% within single-host containers and 17.7% for cross-host container communications.
引用
收藏
页码:934 / 947
页数:14
相关论文
共 50 条
  • [31] Secure Group Communications Using Twisted Group Rings
    Gomez Olvera, Maria Dolores
    Lopez Ramos, Juan Antonio
    Torrecillas Jover, Blas
    MATHEMATICS, 2022, 10 (16)
  • [32] Implementing secure group communications using key graphs
    Kumar, Ch. Aswani
    Lakshmi, R. Sri
    Preethi, M.
    DEFENCE SCIENCE JOURNAL, 2007, 57 (02) : 279 - 285
  • [33] Overhead of using Secure Wireless Communications in Mobile Computing
    Almenares, Florina
    Arias, Patricia, Jr.
    Marin, Andres
    Diaz-Sanchez, Daniel
    Sanchez, Rosa, Jr.
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2013, 59 (02) : 335 - 342
  • [34] Cryptanalyzing chaotic secure communications using return maps
    Yang, T
    Yang, LB
    Yang, CM
    PHYSICS LETTERS A, 1998, 245 (06) : 495 - 510
  • [35] SECURE MULTICAST COMMUNICATIONS USING A KEY DISTRIBUTION CENTER
    JORDAN, F
    MEDINA, M
    INFORMATION NETWORKS AND DATA COMMUNICATION, 1994, 23 : 367 - 380
  • [36] Secure Optical Communications Using Antisqueezed Light with Enhanced Fluctuations
    Tomaru, Tatsuya
    Sasaki, Shinya
    2008 CONFERENCE ON LASERS AND ELECTRO-OPTICS & QUANTUM ELECTRONICS AND LASER SCIENCE CONFERENCE, VOLS 1-9, 2008, : 3619 - +
  • [37] Fuzzy synchronization of chaos using gray prediction for secure communications
    Yu, GR
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3104 - 3109
  • [38] SCUR: Secure communications in Wireless Sensor Networks using Rabbit
    Tahir, Ruhma
    Javed, Muhammad Younas
    Ahmad, Attiq
    Iqbal, Raja
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 523 - +
  • [39] Secure Wireless Communications Using Secret Sharing and Vector Coding
    Yamasaki, Shoichiro
    Matsushima, Tomoko K.
    Miyazaki, Shinichiro
    2014 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2014, : 731 - 734
  • [40] Identity-based secure group communications using pairings
    Rossi, Francesco
    Schmid, Giovanni
    COMPUTER NETWORKS, 2015, 89 : 32 - 43