{"title":"DoS Attack Detection with NIDS in Docker Environment","authors":"Nadia El Ghabri, E. Belmekki, Mostafa Bellafkih","doi":"10.1109/CommNet60167.2023.10365272","DOIUrl":null,"url":null,"abstract":"In recent years, Docker containers have become very popular due to their interesting properties that lie in isolation, portability, and scalability. Like any technology, Docker containers can be vulnerable to attacks. For this reason, attack simulation is a good practice for testing the security of a system, including Docker containers. In this paper, we show how this attack simulation can be executed using the hping3 tool to launch the attack and official Docker images to run containers. The results show that the Snort container can quickly identify and report the simulated attack.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"48 10","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CommNet60167.2023.10365272","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years, Docker containers have become very popular due to their interesting properties that lie in isolation, portability, and scalability. Like any technology, Docker containers can be vulnerable to attacks. For this reason, attack simulation is a good practice for testing the security of a system, including Docker containers. In this paper, we show how this attack simulation can be executed using the hping3 tool to launch the attack and official Docker images to run containers. The results show that the Snort container can quickly identify and report the simulated attack.