Please use this identifier to cite or link to this item:
https://idr.l3.nitk.ac.in/jspui/handle/123456789/13464
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sharath, N. | |
dc.contributor.author | Kumar, V. | |
dc.contributor.author | Chandrasekaran, K. | |
dc.date.accessioned | 2020-03-31T08:45:57Z | - |
dc.date.available | 2020-03-31T08:45:57Z | - |
dc.date.issued | 2016 | |
dc.identifier.citation | International Journal of Control Theory and Applications, 2016, Vol.9, 16, pp.8275-8285 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/13464 | - |
dc.description.abstract | Container technology has taken the world by storm and is replacing virtual machines rapidly. Docker is an open source tool that has implemented containers based on the linux ecosystem. Being lightweight and scalable, Docker has made data scaling very simple. Despite the obvious success of Dockerized applications, certain faults hold it back when it comes to usage in organizations that work with distributed teams. From a security standpoint, it is essential to be aware of scenarios that could cause the downfall of a company's entire network ecosystem with a single command. The study begins with a deep dive into Docker's code base and stress tests that have unearthed some more security issues. Taking into account one such issue related to networking in a multi-container environment gives rise to play on the trade off between efficiency of resource usage in a container, to its security. Using the backward induction technique of a stackelberg competition model, the efficiency of the distributed system can be made a function of its security and functionality. Solutions for both the scenarios where the attacker's type is known and unknown have been proposed using game theoretic approaches. A comparison on Machine Learning and Linear Programming based approaches give rise to the most optimal method for adopting a defense strategy in case of attacks in such distributed systems. International Science Press. | en_US |
dc.title | Solving security issues in Docker using Stackelberg Games | en_US |
dc.type | Article | en_US |
Appears in Collections: | 1. Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.