English  |  正體中文  |  简体中文  |  Items with full text/Total items : 78852/78852 (100%)
Visitors : 36209431      Online Users : 1228
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/83952

    Title: UPFAD: A Solution to Detect Unauthorized Privileged File-Access in Docker
    Authors: 李佳穎;Lee, Jia-Ing
    Contributors: 資訊工程學系
    Keywords: 容器;虛擬化;Linux作業系統;Container;Virtualization;LinuxOS
    Date: 2020-07-21
    Issue Date: 2020-09-02 17:45:09 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 隨著雲端運算的發展及需求,虛擬化的技術日漸成熟,也越來越廣為人所運用。在虛擬化技術之中,除了傳統的虛擬機器(Virtual Machine)之外,還有一個較為輕量化的技術,即為容器(Container)。容器技術不像虛擬機器一樣需仰賴超管理器(Hypervisor)的幫助,既不需要模擬硬體架構,也不必跑在分別的系統核心(Kernel)之上,而是同一台主機(Host)上的所有容器共同享有主機的系統核心。然而,由於容器的隔離並沒有虛擬機器完善,容器也較虛擬機器來得易受攻擊,雖然大部分的漏洞都在被發現後就立刻做了補救,但是針對容器的攻擊手法實在過多,容器的安全防不勝防。


    隨著虛擬技術的蓬勃發展,如何有效保護容器之安全勢必成為未來資安的議題。本研究的目的是從根本保護容器造成的非法檔案存取,即使容器上有漏洞也不會因此侵害到主機的安全。;With the development of cloud computing, virtualization technology is becoming more mature and widely used. In recent days, container technology has been increasingly adopted in various computation scenarios. Compared to virtual machines, the elimination of additional abstraction layers leads to better resource utilization and improved efficiency. However, since all containers share the same operating system kernel with their host, the container technology also introduced a number of security issues.

    We propose a detection system that detects unauthorized privileged file-accesses to protect the security of the host. Even if there are vulnerabilities in the container, our system can protect the illegal file-accesses from the host fundamentally and thus would not infringe the security of the host. After experiments, we found that our system could detect illegal file-accesses successfully and the overhead introduced by our system is neglectable.
    Appears in Collections:[資訊工程研究所] 博碩士論文

    Files in This Item:

    File Description SizeFormat

    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明