Secure Inter-Container Communications Using XDP/eBPF

被引:7
|
作者
Nam, Jaehyun [1 ]
Lee, Seungsoo [2 ]
Porras, Phillip [3 ]
Yegneswaran, Vinod [3 ]
Shin, Seungwon [4 ]
机构
[1] Dankook Univ, Dept Comp Engn, Yongin 16890, South Korea
[2] Incheon Natl Univ, Dept Comp Sci & Engn, Incheon 22012, South Korea
[3] SRI Int, Menlo Pk, CA 94025 USA
[4] Korea Adv Inst Sci & Technol, Sch Elect Engn, Daejeon 34141, South Korea
基金
新加坡国家研究基金会;
关键词
Container security; network sandboxing; policy enforcement; security function chaining; XDP/eBPF;
D O I
10.1109/TNET.2022.3206781
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While the use of containerization technologies for virtual application deployment has grown at an astonishing rate, the question of the robustness of container networking has not been well scrutinized from a security perspective, even though inter-container networking is indispensable for microservices. Thus, this paper first analyzes container networks from a security perspective, discussing the implications based on their architectural limitations. Then, it presents Bastion(+), a secure inter-container communication bridge. Bastion(+) introduces (i) a network security enforcement stack that provides fine-grained control per container application and securely isolates intercontainer traffic in a point-to-point manner. Bastion(+) also supports (ii) selective security function chaining, enabling various security functions to be chained between containers for further security inspections (e.g., deep packet inspection) according to the container's network context. Bastion(+) incorporates (iii) a security policy assistant that helps an administrator discover inter-container networking dependencies correctly. Our evaluation demonstrates how Bastion(+) can effectively mitigate several adversarial attacks in container networks while improving the overall performance up to 25.4% within single-host containers and 17.7% for cross-host container communications.
引用
收藏
页码:934 / 947
页数:14
相关论文
共 50 条
  • [41] Secure optical communications using antisqueezed light with enhanced fluctuations
    Advanced Research Laboratory, Hitachi, Ltd, Hatoyama, Saitama 350-0395, Japan
    不详
    Optics InfoBase Conference Papers, 2008,
  • [42] Chaos synchronization using impulsive driving and applications to secure communications
    Li, YL
    Liu, XZ
    Shen, XM
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2003, 10 (06): : 899 - 913
  • [43] Secure thermal infrared communications using engineered blackbody radiation
    Xiaoxin Liang
    Fangjing Hu
    Yuepeng Yan
    Stepan Lucyszyn
    Scientific Reports, 4
  • [44] Secure communications using interference alignment in MIMO interference channels
    Sasaki, Satoshi
    Shimizu, Takayuki
    Iwai, Hisato
    Sasaoka, Hideichi
    IEICE COMMUNICATIONS EXPRESS, 2014, 3 (02): : 50 - 54
  • [45] Directional Modulation Using Frequency Diverse Array For Secure Communications
    Jie Xiong
    Shaddrack Yaw Nusenu
    Wen-Qin Wang
    Wireless Personal Communications, 2017, 95 : 2679 - 2689
  • [46] Hybrid Scheme for Secure Communications Using Quantum and Classical Mechanisms
    Plesa, Mihail-Iulian
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE - ECAI 2017, 2017,
  • [47] Secure thermal infrared communications using engineered blackbody radiation
    Liang, Xiaoxin
    Hu, Fangjing
    Yan, Yuepeng
    Lucyszyn, Stepan
    SCIENTIFIC REPORTS, 2014, 4
  • [48] Secure communications on passive optical networks using quantum cryptography
    Townsend, PD
    22ND EUROPEAN CONFERENCE ON OPTICAL COMMUNICATIONS, PROCEEDINGS, VOLS 1-6: CO-LOCATED WITH: 2ND EUROPEAN EXHIBITION ON OPTICAL COMMUNICATION - EEOC '96, 1996, : C35 - C38
  • [49] Directional Modulation Using Frequency Diverse Array For Secure Communications
    Xiong, Jie
    Nusenu, Shaddrack Yaw
    Wang, Wen-Qin
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 2679 - 2689
  • [50] Lawful Interception Scheme for Secure VoIP Communications using TTP
    Yoon, Seokung
    Jeong, Jongil
    Jeong, Hyuncheol
    Won, Yoojae
    CSA 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 149 - 152