{"title":"容器攻击:爆炸半径分析","authors":"Assaf Morag","doi":"10.12968/s1353-4858(22)70048-7","DOIUrl":null,"url":null,"abstract":"Containers may seem to offer greater security through segregation. But they are increasingly becoming a focus for attackers looking to escape the confines of containers in order to move laterally across the system. This is typically achieved through maliciously crafted container images, as recent research using honeypots has shown.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"9 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Container attacks: a blast radius analysis\",\"authors\":\"Assaf Morag\",\"doi\":\"10.12968/s1353-4858(22)70048-7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Containers may seem to offer greater security through segregation. But they are increasingly becoming a focus for attackers looking to escape the confines of containers in order to move laterally across the system. This is typically achieved through maliciously crafted container images, as recent research using honeypots has shown.\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"9 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(22)70048-7\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(22)70048-7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Containers may seem to offer greater security through segregation. But they are increasingly becoming a focus for attackers looking to escape the confines of containers in order to move laterally across the system. This is typically achieved through maliciously crafted container images, as recent research using honeypots has shown.