Prevent Registry Being Compromised by Pulling Insecure Container Images from Public Registries

V.U. KumarasiriDepartment of Computer Systems Engineering, Sri Lanka Institute of Information Technology, Sri LankaMs. Chethana LiyanapathiranaLecturer, Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, Sri LankaDr. Lakmal RupasingheLecturer, Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, Sri Lanka

Vol 7 No 11 (2023): Volume 7, Issue 11, November 2023 | Pages: 315-320

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 10-11-2023

doi Logo doi.org/10.47001/IRJIET/2023.711043

Abstract

Container technology is one of the fastest growing technologies. However, when it comes to the security of containers, it appears that their vulnerability has increased in line with its popularity. Because when users pulled images from various repositories for various need there can be images that can be harmful images to entire container environment. So, we need to verify security of those images before store them into container environments. In this paper, I describe a mechanism that can validate security level of container image before it pulled into the container. In addition, we use hash validation as well as Format String Validation for further check the image validity.

Keywords

Docker, Container Vulnerability, Hash Validation, Format Matching


Citation of this Article

V.U. Kumarasiri, Ms. Chethana Liyanapathirana, Dr. Lakmal Rupasinghe, “Prevent Registry Being Compromised by Pulling Insecure Container Images from Public Registries” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 11, pp 315-320, November 2023. Article DOI https://doi.org/10.47001/IRJIET/2023.711043

References
  1. K. Brady, S. Moon, T. Nguyen, and J. Coffman, "Docker Container Security in Cloud Computing," Engineering for Professionals, Whiting School of Engineering, Johns Hopkins University, Department of Computer and Cyber Sciences, United States Air Force Academy.
  2. Waheeda Syed Shameem Ahamed,Pavol Zavarsky ,Bobby Swar, "Security Audit of Docker Container Images in Cloud Architecture".2021.
  3. Thien-Phuc Doan , Souhwan Jung, "DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning," 2022.
  4. Li, Yujie, et al. "Towards Holistic Vulnerability Assessment of Container Image Supply Chain." Proceedings of the ACM Workshop on Cyber-Physical Systems Security and Privacy. 2019.