Vulnerability Analysis of 2500 Docker Hub Images

نویسندگان

چکیده

The use of container technology has skyrocketed during the last few years, with Docker as leading platform. Docker’s online repository for publicly available images, called Hub, hosts over 3.5 million images at time writing, making it world’s largest community images. We perform an extensive vulnerability analysis 2500 It is particular interest to this type because landscape a rapidly changing category, scanners are constantly developed and updated, new vulnerabilities discovered, volume on Hub increasing every day. Our main findings reveal that (1) number newly introduced increasing; (2) certified most vulnerable; (3) official least (4) there no correlation between image features (i.e., pulls, stars, days since update); (5) severe originate from two popular scripting languages, JavaScript Python; (6) Python 2.x packages jackson-databind contain highest vulnerabilities. perceive our study published in open literature couple years.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Docker Security

Over the last few years, the use of virtualization technologies has increased dramatically. This makes the demand for efficient and secure virtualization solutions become more obvious. Container-based virtualization and hypervisor-based virtualization are two main types of virtualization technologies that have emerged to the market. Of these two classes, container-based virtualization is able t...

متن کامل

With Great Brain Hub Connectivity Comes Great Vulnerability.

Theoretical and empirical studies have begun to explore the structure and function of the human brain from a system perspective, using network science to abstractly model the brain as a set of nodes (e.g., brain regions) and edges (e.g., structural or functional connections) [1]. Within this framework, many studies have identified a small set of highly connected network nodes, referred to as hu...

متن کامل

Activity Dependent Degeneration Explains Hub Vulnerability in Alzheimer's Disease

Brain connectivity studies have revealed that highly connected 'hub' regions are particularly vulnerable to Alzheimer pathology: they show marked amyloid-β deposition at an early stage. Recently, excessive local neuronal activity has been shown to increase amyloid deposition. In this study we use a computational model to test the hypothesis that hub regions possess the highest level of activity...

متن کامل

Large-scale image analysis using docker sandboxing

With the advent of specialized hardware such as Graphics Processing Units (GPUs), large scale image localization, classification and retrieval have seen increased prevalence. Designing scalable software architecture that co-evolves with such specialized hardware is a challenge in the commercial setting. In this paper, we describe one such architecture (Cortexica) that leverages scalability of G...

متن کامل

woman-defined identity: analysis of selected poems of adrienne rich

the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Transactions on computational science and computational intelligence

سال: 2021

ISSN: ['2569-7072', '2569-7080']

DOI: https://doi.org/10.1007/978-3-030-71017-0_22