Analysis of DoS attacks on Docker inter-component stdio copy

In recent years,Docker has been widely deployed due to its flexibility and high scalability.However,its modular design leads to the DoS attacks on inter-component communication.A new DoS attack that outputs to stdout,causing high CPU usages among different Docker components.Analysis shows that the s...

Full description

Saved in:
Bibliographic Details
Main Authors: Tianyu ZHOU, Wenbo SHEN, Nanzi YANG, Jinku LI, Chenggang QIN, Wang YU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2020-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020074
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In recent years,Docker has been widely deployed due to its flexibility and high scalability.However,its modular design leads to the DoS attacks on inter-component communication.A new DoS attack that outputs to stdout,causing high CPU usages among different Docker components.Analysis shows that the stdout output triggers the goroutines of Docker components.To find all goroutines setup paths,using the static analysis method to analyze the Docker components systematically was proposed.A static analysis framework was designed and implemented,and evaluated on Docker source code.The results show that static analysis framework finds 34 paths successfully,while 22 of them are confirmed by runtime verification.
ISSN:2096-109X