TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publications
  4. CONSERVE: A framework for the selection of techniques for monitoring containers security
 
Options

CONSERVE: A framework for the selection of techniques for monitoring containers security

Citation Link: https://doi.org/10.15480/882.4139
Publikationstyp
Journal Article
Date Issued
2022-04
Sprache
English
Author(s)
Jolak, Rodi  
Rosenstatter, Thomas  
Mohamad, Mazen  
Strandberg, Kim  
Sangchoolie, Behrooz  
Nowdehi, Nasser  
Scandariato, Riccardo  
Institut
Software Security E-22  
TORE-DOI
10.15480/882.4139
TORE-URI
http://hdl.handle.net/11420/11657
Journal
The journal of systems and software  
Volume
186
Article Number
111158
Citation
Journal of Systems and Software 186: 111158 (2022-04)
Publisher DOI
10.1016/j.jss.2021.111158
Scopus ID
2-s2.0-85121691498
Publisher
Elsevier
Context: Container-based virtualization is gaining popularity in different domains, as it supports continuous development and improves the efficiency and reliability of run-time environments. Problem: Different techniques are proposed for monitoring the security of containers. However, there are no guidelines supporting the selection of suitable techniques for the tasks at hand. Objective: We aim to support the selection and design of techniques for monitoring container-based virtualization environments. Approach:: First, we review the literature and identify techniques for monitoring containerized environments. Second, we classify these techniques according to a set of categories, such as technical characteristic, applicability, effectiveness, and evaluation. We further detail the pros and cons that are associated with each of the identified techniques. Result: As a result, we present CONSERVE, a multi-dimensional decision support framework for an informed and optimal selection of a suitable set of container monitoring techniques to be implemented in different application domains. Evaluation: A mix of eighteen researchers and practitioners evaluated the ease of use, understandability, usefulness, efficiency, applicability, and completeness of the framework. The evaluation shows a high level of interest, and points out to potential benefits.
Subjects
Attack analysis
Container monitoring
Intrusion detection
Security
Software and systems engineering
Virtualization
DDC Class
600: Technik
More Funding Information
We would like to thank the participants who took a part in the evaluation of CONSERVE. This research was partially supported by the Swedish VINNOVA FFI project CyReV: Cyber Resilience for Vehicles with diary numbers: 2018-05013 (1st phase) and 2019-03071 (2nd phase).
Publication version
publishedVersion
Lizenz
https://creativecommons.org/licenses/by/4.0/
Loading...
Thumbnail Image
Name

1-s2.0-S0164121221002478-main.pdf

Size

1.47 MB

Format

Adobe PDF

TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback