Comparison between security majors in virtual machine and linux containers

نویسنده

  • Udit Gupta
چکیده

Virtualization started to gain traction in the domain of information technology in the early 2000’s when managing resource distribution was becoming an uphill task for developers. As a result, tools like VMWare, Hyper-V (hypervisor) started making inroads into the software repository on different operating systems. VMWare and Hyper-V could support multiple virtual machines running on them with each having their own isolated environment. Due to this isolation, the security aspects of virtual machines (VMs) did not differ much from that of physical machines (having a dedicated operating system on hardware). The advancement made in the domain of linux containers (LXC) has taken virtualization to an altogether different level where resource utilization by various applications has been further optimized. But the container security has assumed primary importance amongst the researchers today and this paper is inclined towards providing a brief overview about comparisons between security of container and VMs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments

The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and operated do not lend themselves well to the conventional application of methods for conducting intrusion detection and analysis in traditional physical and virtual machine networks. While similarities exist in some of the methods used to perform intrusion detection and analysis in conven...

متن کامل

Hardware Assisted OS Virtualization

Operating System-level virtualization, also known as a container, is an increasingly popular approach to isolating applications that use the same underlying OS kernel [2, 5–7]. Containers have recently gained popularity as the default back-end for Docker, an application packaging and distribution system used by companies including Google [3]. The purported reason to use containers over a hardwa...

متن کامل

Virtual Clusters for Hands-on Linux Cluster Construction Education

This paper presents the design and implementation of a virtual cluster hosting platform for hands-on Linux cluster system administration education. Using operating system and network virtualization, a collection of physical hosts is used to provide an arbitrary number of Linux clusters suitable for supporting instructional exercises in system administration and cluster technology. The virtual c...

متن کامل

User-mode Linux

User-mode Linux is the port of the Linux kernel to userspace. It runs a Linux virtual machine in a set of processes on a Linux host. A UML virtual machine is capable of running nearly the same set of processes as the host. It lends itself to a variety of applications, such as kernel development, security applications like sandboxing and jailing, and virtual networking. This paper describes the ...

متن کامل

Performance Comparison for Mining Large Data from the Internet and Learning using ID3 Algorithm in a Docker versus Virtual Machine Environment

Every day, 2.5 quintillion bytes of data are generated. A sizeable portion of the data is available through the internet. The efficacy of the decisions being made revolves around the extent to which analysis is performed on the procured data. Containers provide Operating System Virtualization and Linux Containers present secure execution environments by independently executing processes.[1]This...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1507.07816  شماره 

صفحات  -

تاریخ انتشار 2015