DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nam, Jaehyun | ko |
dc.contributor.author | Lee, Seungsoo | ko |
dc.contributor.author | Porras, Phillip | ko |
dc.contributor.author | Yegneswaran, Vinod | ko |
dc.contributor.author | Shin, Seungwon | ko |
dc.date.accessioned | 2023-05-13T04:02:23Z | - |
dc.date.available | 2023-05-13T04:02:23Z | - |
dc.date.created | 2022-10-17 | - |
dc.date.issued | 2023-04 | - |
dc.identifier.citation | IEEE-ACM TRANSACTIONS ON NETWORKING, v.31, no.2, pp.934 - 947 | - |
dc.identifier.issn | 1063-6692 | - |
dc.identifier.uri | http://hdl.handle.net/10203/306795 | - |
dc.description.abstract | While the use of containerization technologies for virtual application deployment has grown at an astonishing rate, the question of the robustness of container networking has not been well scrutinized from a security perspective, even though inter-container networking is indispensable for microservices. Thus, this paper first analyzes container networks from a security perspective, discussing the implications based on their architectural limitations. Then, it presents Bastion(+), a secure inter-container communication bridge. Bastion(+) introduces (i) a network security enforcement stack that provides fine-grained control per container application and securely isolates intercontainer traffic in a point-to-point manner. Bastion(+) also supports (ii) selective security function chaining, enabling various security functions to be chained between containers for further security inspections (e.g., deep packet inspection) according to the container's network context. Bastion(+) incorporates (iii) a security policy assistant that helps an administrator discover inter-container networking dependencies correctly. Our evaluation demonstrates how Bastion(+) can effectively mitigate several adversarial attacks in container networks while improving the overall performance up to 25.4% within single-host containers and 17.7% for cross-host container communications. | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Secure Inter-Container Communications Using XDP/eBPF | - |
dc.type | Article | - |
dc.identifier.wosid | 000862436500001 | - |
dc.identifier.scopusid | 2-s2.0-85139386446 | - |
dc.type.rims | ART | - |
dc.citation.volume | 31 | - |
dc.citation.issue | 2 | - |
dc.citation.beginningpage | 934 | - |
dc.citation.endingpage | 947 | - |
dc.citation.publicationname | IEEE-ACM TRANSACTIONS ON NETWORKING | - |
dc.identifier.doi | 10.1109/TNET.2022.3206781 | - |
dc.contributor.localauthor | Shin, Seungwon | - |
dc.contributor.nonIdAuthor | Nam, Jaehyun | - |
dc.contributor.nonIdAuthor | Lee, Seungsoo | - |
dc.contributor.nonIdAuthor | Porras, Phillip | - |
dc.contributor.nonIdAuthor | Yegneswaran, Vinod | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Container security | - |
dc.subject.keywordAuthor | network sandboxing | - |
dc.subject.keywordAuthor | policy enforcement | - |
dc.subject.keywordAuthor | security function chaining | - |
dc.subject.keywordAuthor | XDP/eBPF | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.