Prevent Registry Being Compromised by Pulling Insecure Container Images from Public Registries

Abstract

Container technology is one of the fastest growing technologies. However, when it comes to the security of containers, it appears that their vulnerability has increased in line with its popularity. Because when users pulled images from various repositories for various need there can be images that can be harmful images to entire container environment. So, we need to verify security of those images before store them into container environments. In this paper, I describe a mechanism that can validate security level of container image before it pulled into the container. In addition, we use hash validation as well as Format String Validation for further check the image validity.

Country : Sri Lanka

1 V.U. Kumarasiri2 Ms. Chethana Liyanapathirana3 Dr. Lakmal Rupasinghe

  1. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, Sri Lanka
  2. Lecturer, Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, Sri Lanka
  3. Lecturer, Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, Sri Lanka

IRJIET, Volume 7, Issue 11, November 2023 pp. 315-320

doi.org/10.47001/IRJIET/2023.711043

References

  1. K. Brady, S. Moon, T. Nguyen, and J. Coffman, "Docker Container Security in Cloud Computing," Engineering for Professionals, Whiting School of Engineering, Johns Hopkins University, Department of Computer and Cyber Sciences, United States Air Force Academy.
  2. Waheeda Syed Shameem Ahamed,Pavol Zavarsky ,Bobby Swar, "Security Audit of Docker Container Images in Cloud Architecture".2021.
  3. Thien-Phuc Doan , Souhwan Jung, "DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning," 2022.
  4. Li, Yujie, et al. "Towards Holistic Vulnerability Assessment of Container Image Supply Chain." Proceedings of the ACM Workshop on Cyber-Physical Systems Security and Privacy. 2019.