DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.
Title: Strategies for Malware Defense in Containerized Environments
Authors: usra sami
Journal: University of Sindh Journal of Information and Communication Technology
Publisher: University of Sindh, Jamshoro
Country: Pakistan
Year: 2024
Volume: 8
Issue: 1
Language: en
Keywords: : ContainerDockerTrivyvulnerabilitiesMal- ware.
With the rising problems of portability, compati- bility, and scalability in deployment on different environments, containers were introduced. Containers are isolated, portable, and efficient ways of running modern applications. Their use- fulness as tools though, has also led to increased cases of insecurity. The conventional ways of container protection were Ubuntu, Clair, Grape, STRIDE, and DREAD frameworks that relied mostly on vulnerability assessment and threat modelling. However, these measures did not include changes in the evolving features of container attacks aimed at protecting image interfaces and APIs. This paper provides an in-depth analysis of malware attacks and restricting privileges to non-root users upon mali- cious identification. This is done to minimize the attack vectors including the preference of non-root users and only using up- to-date lightweight base images, and multiple build formations. In this paper, the implementation of the Trivy tool is done in the protection of malware attacks. Scanner Trivy is an Open- Source vulnerability scanner that can identify threats and eval- uate risks, to avoid misconfigurations and vulnerabilities. This prevents probable attacks by providing a secure and reliable host environment. Therefore, it helps future generations in mitigating the risks associated with working with contained environments and in overcoming any possible future threats.
Loading PDF...
Loading Statistics...