參考文獻 |
[1] Amazon Web Services. https://aws.amazon.com/tw/. Accessed: 2022-06-28.
[2] AWS Fargate. https://aws.amazon.com/tw/fargate/. Accessed: 2022-06-28.
[3] AWS Lambda. https://aws.amazon.com/tw/lambda/. Accessed: 2022-06-28.
[4] containerd. https://containerd.io/. Accessed: 2022-06-28.
[5] cri-o: LIGHTWEIGHT CONTAINER RUNTIME FOR KUBERNETES. https:
//cri-o.io/. Accessed: 2022-06-28.
[6] Docker. https://www.docker.com/. Accessed: 2022-06-28.
[7] Falcosecurity/Falco:
Cloud Native Runtime Security.
https://github.com/
falcosecurity/falco. Accessed: 2022-06-04.
[8] Google Cloud Platform. https://cloud.google.com/. Accessed: 2022-06-28.
[9] gVisor. https://gvisor.dev/. Accessed: 2022-05-14.
[10] Introduction to linux containers. https://access.redhat.com/documentation/
en-us/red_hat_enterprise_linux_atomic_host/7/html/overview_of_
containers_in_red_hat_systems/introduction_to_linux_containers.
Ac-
cessed: 2022-02-24.
[11] Linux
Control
Groups.
https://www.kernel.org/doc/html/latest/
admin-guide/cgroup-v1/cgroups.html. Accessed: 2022-06-28.
[12] Microsoft Azure. https://azure.microsoft.com/zh-tw/. Accessed: 2022-06-28.
32[13] Open Container Initiative. https://opencontainers.org/about/overview/. Ac-
cessed: 2022-06-28.
[14] ptrace(2) — Linux manual page.
https://man7.org/linux/man-pages/man2/
ptrace.2.html. Accessed: 2022-06-28.
[15] Python Flask Framework. https://flask.palletsprojects.com/en/2.1.x/. Ac-
cessed: 2022-06-24.
[16] runc. https://github.com/opencontainers/runc. Accessed: 2022-06-28.
[17] Seccomp Security Profiles for Docker.
https://docs.docker.com/engine/
security/seccomp. Accessed: 2022-02.
[18] tsenart/vegeta: HTTP load testing tool and library. https://github.com/tsenart/
vegeta. Accessed: 2022-06-25.
[19] Union Filesystem. https://linux.die.net/man/8/unionfs. Accessed: 2022-06-28.
[20] Alexandru Agache, Marc Brooker, Alexandra Iordache, Anthony Liguori, Rolf Neuge-
bauer, Phil Piwonka, and Diana-Maria Popa. Firecracker: Lightweight virtualization
for serverless applications. In 17th USENIX symposium on networked systems design
and implementation (NSDI 20), pages 419–434, 2020.
[21] Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, and Felix Freil-
ing. The nepenthes platform: An efficient approach to collect malware. In Interna-
tional Workshop on Recent Advances in Intrusion Detection, pages 165–184. Springer,
2006.
[22] Ioana Baldini, Paul Castro, Kerry Chang, Perry Cheng, Stephen Fink, Vatche
Ishakian, Nick Mitchell, Vinod Muthusamy, Rodric Rabbah, Aleksander Slominski,
33et al. Serverless computing: Current trends and open problems. In Research advances
in cloud computing, pages 1–20. Springer, 2017.
[23] Fabrice Bellard. Qemu, a fast and portable dynamic translator. In USENIX annual
technical conference, FREENIX Track, volume 41, pages 10–5555. Califor-nia, USA,
2005.
[24] Thanh Bui. Analysis of docker security. arXiv preprint arXiv:1501.02967, 2015.
[25] Brendan Burns, Joe Beda, and Kelsey Hightower. Kubernetes: up and running: dive
into the future of infrastructure. O’Reilly Media, 2019.
[26] Tyler Caraza-Harter and Michael M Swift. Blending containers and virtual machines:
a study of firecracker and gvisor. In Proceedings of the 16th ACM SIGPLAN/SIGOPS
International Conference on Virtual Execution Environments, pages 101–113, 2020.
[27] Jeeva Chelladhurai, Pethuru Raj Chelliah, and Sathish Alampalayam Kumar. Secur-
ing docker containers from denial of service (dos) attacks. In 2016 IEEE International
Conference on Services Computing (SCC), pages 856–859. IEEE, 2016.
[28] Jessie YC Chen and Jennifer E Thropp. Review of low frame rate e↵ects on human
performance. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems
and Humans, 37(6):1063–1076, 2007.
[29] Kenneth Ward Church. Word2vec. Natural Language Engineering, 23(1):155–162,
2017.
[30] Fred Cohen. The use of deception techniques: Honeypots and decoys. Handbook of
Information Security, 3(1):646–655, 2006.
34[31] Handong Cui, Delu Huang, Yong Fang, Liang Liu, and Cheng Huang. Webshell
detection based on random forest–gradient boosting decision tree algorithm. In 2018
IEEE Third International Conference on Data Science in Cyberspace (DSC), pages
153–160. IEEE, 2018.
[32] Lennart Espe, Anshul Jindal, Vladimir Podolskiy, and Michael Gerndt. Performance
evaluation of container runtimes. In CLOSER, pages 273–281, 2020.
[33] Francisco Javier Thayer Fábrega, Francisco Javier, and Joshua D Guttman. Copy
on write. 1995.
[34] Xing Gao, Zhongshu Gu, Zhengfa Li, Hani Jamjoom, and Cong Wang. Houdini’s
escape: Breaking the resource rein of linux control groups. In Proceedings of the
2019 ACM SIGSAC Conference on Computer and Communications Security, pages
1073–1086, 2019.
[35] Seyedhamed Ghavamnia, Tapti Palit, Azzedine Benameur, and Michalis Polychron-
akis. Confine: Automated system call policy generation for container attack surface
reduction. In 23rd International Symposium on Research in Attacks, Intrusions and
Defenses (RAID 2020), pages 443–458, 2020.
[36] You Guo, Hector Marco-Gisbert, and Paul Keir. Mitigating webshell attacks through
machine learning techniques. Future Internet, 12(1):12, 2020.
[37] Miyoung Kim, Misun Kim, and Youngsong Mun. Design and implementation of the
honeypot system with focusing on the session redirection. In International Conference
on Computational Science and Its Applications, pages 262–269. Springer, 2004.
[38] Ioannis Koniaris, Georgios Papadimitriou, and Petros Nicopolitidis. Analysis and
35visualization of ssh attacks using honeypots. In Eurocon 2013, pages 65–72. IEEE,
2013.
[39] Guoqing Li, Keichi Takahashi, Kohei Ichikawa, Hajimu Iida, Pree Thiengbu-
ranathum, and Passakorn Phannachitta.
Comparative performance study of
lightweight hypervisors used in container environment. In CLOSER, pages 215–223,
2021.
[40] Songsong Liu, Pengbin Feng, and Kun Sun. Honeybog: A hybrid webshell honeypot
framework against command injection. In 2021 IEEE Conference on Communications
and Network Security (CNS), pages 218–226. IEEE, 2021.
[41] Filipe Manco, Costin Lupu, Florian Schmidt, Jose Mendes, Simon Kuenzer, Sumit
Sati, Kenichi Yasukata, Costin Raiciu, and Felipe Huici. My vm is lighter (and safer)
than your container. In Proceedings of the 26th Symposium on Operating Systems
Principles, pages 218–233, 2017.
[42] Jaehyun Nam, Seungsoo Lee, Hyunmin Seo, Phil Porras, Vinod Yegneswaran, and
Seungwon Shin. {BASTION}: A security enforcement network stack for container
networks. In 2020 USENIX Annual Technical Conference (USENIX ATC 20), pages
81–95, 2020.
[43] Rob Pike, Dave Presotto, Sean Dorward, Bob Flandrena, Ken Thompson, Howard
Trickey, and Phil Winterbottom. Plan 9 from bell labs. Computing systems, 8(3):221–
254, 1995.
[44] Alessandro Randazzo and Ilenia Tinnirello. Kata containers: An emerging architec-
ture for enabling mec services in fast and secure way. In 2019 Sixth International
36Conference on Internet of Things: Systems, Management and Security (IOTSMS),
pages 209–214. IEEE, 2019.
[45] Jörg Thalheim, Pramod Bhatotia, Pedro Fonseca, and Baris Kasikci.
Lightweight {OS} containers.
Cntr:
In 2018 USENIX Annual Technical Conference
(USENIX ATC 18), pages 199–212, 2018.
[46] Yifan Tian, Jiabao Wang, Zhenji Zhou, and Shengli Zhou. Cnn-webshell: malicious
web shell detection with convolutional neural network. In Proceedings of the 2017 VI
International Conference on Network, Communication and Computing, pages 75–79,
2017.
[47] Truong Dinh Tu, Cheng Guang, Guo Xiaojun, and Pan Wubin. Webshell detection
techniques in web applications. In Fifth International Conference on Computing,
Communications and Networking Technologies (ICCCNT), pages 1–7. IEEE, 2014.
[48] Wenchuan Yang, Bang Sun, and Baojiang Cui. A webshell detection technology
based on http traffic analysis. In International Conference on Innovative Mobile and
Internet Services in Ubiquitous Computing, pages 336–342. Springer, 2018.
[49] Tatu Ylonen and Chris Lonvick. The secure shell (ssh) transport layer protocol.
Technical report, 2006.
[50] Hua Zhang, Hongchao Guan, Hanbing Yan, Wenmin Li, Yuqi Yu, Hao Zhou, and
Xingyu Zeng. Webshell traffic detection with character-level features based on deep
learning. IEEE Access, 6:75268–75277, 2018.
[51] Qi Zhang, Ling Liu, Calton Pu, Qiwei Dou, Liren Wu, and Wei Zhou. A comparative
study of containers and virtual machines in big data environment. In 2018 IEEE
3711th International Conference on Cloud Computing (CLOUD), pages 178–185. IEEE,
2018.
[52] Danyang Zhuo, Kaiyuan Zhang, Yibo Zhu, Hongqiang Harry Liu, Matthew Rockett,
Arvind Krishnamurthy, and Thomas Anderson. Slim:{OS} kernel support for a {Low-
Overhead} container overlay network. In 16th USENIX Symposium on Networked
Systems Design and Implementation (NSDI 19), pages 331–344, 2019. |