Concepedia

Publication | Closed Access

Secure Namespaced Kernel Audit for Containers

18

Citations

37

References

2021

Year

Abstract

Despite the wide usage of container-based cloud computing, container auditing for security analysis relies mostly on built-in host audit systems, which often lack the ability to capture high-fidelity container logs. State-of-the-art reference-monitor-based audit techniques greatly improve the quality of audit logs, but their system-wide architecture is too costly to be adapted for individual containers. Moreover, these techniques typically require extensive kernel modifications, making it difficult to deploy in practical settings.

References

YearCitations

Page 1