Publication | Closed Access
Secure Namespaced Kernel Audit for Containers
18
Citations
37
References
2021
Year
Unknown Venue
AuditingContainer-based Cloud ComputingEngineeringOs-level VirtualizationInformation SecurityVirtualization SecurityCloud ComputingService MonitoringData PrivacySecurityTrusted Execution EnvironmentCloud Computing SecurityComputer ScienceAudit LogsExtensive Kernel ModificationsSecurity AuditData SecurityCryptography
Despite the wide usage of container-based cloud computing, container auditing for security analysis relies mostly on built-in host audit systems, which often lack the ability to capture high-fidelity container logs. State-of-the-art reference-monitor-based audit techniques greatly improve the quality of audit logs, but their system-wide architecture is too costly to be adapted for individual containers. Moreover, these techniques typically require extensive kernel modifications, making it difficult to deploy in practical settings.
| Year | Citations | |
|---|---|---|
Page 1
Page 1