Standard

An Overview of Container Security in a Kubernetes Cluster. / German, Kazenas; Ponomareva, Olga.
Proceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023: book. Institute of Electrical and Electronics Engineers Inc., 2023. стр. 283-285.

Результаты исследований: Глава в книге, отчете, сборнике статейМатериалы конференцииРецензирование

Harvard

German, K & Ponomareva, O 2023, An Overview of Container Security in a Kubernetes Cluster. в Proceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023: book. Institute of Electrical and Electronics Engineers Inc., стр. 283-285, Международная конференция 2023 Урало-Сибирская конференция по биомедицинской инженерии, радиоэлектронике и информационным технологиям (USBEREIT 2023), Екатеринбург, Российская Федерация, 15/05/2023. https://doi.org/10.1109/USBEREIT58508.2023.10158865

APA

German, K., & Ponomareva, O. (2023). An Overview of Container Security in a Kubernetes Cluster. в Proceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023: book (стр. 283-285). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/USBEREIT58508.2023.10158865

Vancouver

German K, Ponomareva O. An Overview of Container Security in a Kubernetes Cluster. в Proceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023: book. Institute of Electrical and Electronics Engineers Inc. 2023. стр. 283-285 doi: 10.1109/USBEREIT58508.2023.10158865

Author

German, Kazenas ; Ponomareva, Olga. / An Overview of Container Security in a Kubernetes Cluster. Proceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023: book. Institute of Electrical and Electronics Engineers Inc., 2023. стр. 283-285

BibTeX

@inproceedings{233092acd970404d832f3a62a88bab61,
title = "An Overview of Container Security in a Kubernetes Cluster",
abstract = "Recently, the use of container technology for applications has become commonplace. The advantages of this technology allow you to quickly develop and implement new services and applications in any programming language. The Kubernetes platform is the most popular container orchestration tool and is widely used for application development and deployment. Kubernetes not only allows you to deploy applications, but also performs functions such as load balancing, storage organization, secret storage and much more. However, experts pay attention to possible security problems when using Kubernetes. Attackers can use application containers in Kubernetes not only to obtain data processed by the application, but also to form an entry point into the company's infrastructure for a subsequent attack on the company's internal assets. The configuration requirements of the containerization platform cannot fully protect against malicious actions from containers, so it is necessary to supplement the protection system with tools that could track actions in the container in real time. This article will compare several Kubernetes real-time cluster security solutions and show their advantages and disadvantages.",
author = "Kazenas German and Olga Ponomareva",
year = "2023",
month = may,
day = "15",
doi = "10.1109/USBEREIT58508.2023.10158865",
language = "English",
pages = "283--285",
booktitle = "Proceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",
note = "2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT) ; Conference date: 15-05-2023 Through 17-05-2023",

}

RIS

TY - GEN

T1 - An Overview of Container Security in a Kubernetes Cluster

AU - German, Kazenas

AU - Ponomareva, Olga

PY - 2023/5/15

Y1 - 2023/5/15

N2 - Recently, the use of container technology for applications has become commonplace. The advantages of this technology allow you to quickly develop and implement new services and applications in any programming language. The Kubernetes platform is the most popular container orchestration tool and is widely used for application development and deployment. Kubernetes not only allows you to deploy applications, but also performs functions such as load balancing, storage organization, secret storage and much more. However, experts pay attention to possible security problems when using Kubernetes. Attackers can use application containers in Kubernetes not only to obtain data processed by the application, but also to form an entry point into the company's infrastructure for a subsequent attack on the company's internal assets. The configuration requirements of the containerization platform cannot fully protect against malicious actions from containers, so it is necessary to supplement the protection system with tools that could track actions in the container in real time. This article will compare several Kubernetes real-time cluster security solutions and show their advantages and disadvantages.

AB - Recently, the use of container technology for applications has become commonplace. The advantages of this technology allow you to quickly develop and implement new services and applications in any programming language. The Kubernetes platform is the most popular container orchestration tool and is widely used for application development and deployment. Kubernetes not only allows you to deploy applications, but also performs functions such as load balancing, storage organization, secret storage and much more. However, experts pay attention to possible security problems when using Kubernetes. Attackers can use application containers in Kubernetes not only to obtain data processed by the application, but also to form an entry point into the company's infrastructure for a subsequent attack on the company's internal assets. The configuration requirements of the containerization platform cannot fully protect against malicious actions from containers, so it is necessary to supplement the protection system with tools that could track actions in the container in real time. This article will compare several Kubernetes real-time cluster security solutions and show their advantages and disadvantages.

UR - http://www.scopus.com/inward/record.url?partnerID=8YFLogxK&scp=85164951484

U2 - 10.1109/USBEREIT58508.2023.10158865

DO - 10.1109/USBEREIT58508.2023.10158865

M3 - Conference contribution

SP - 283

EP - 285

BT - Proceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023

PB - Institute of Electrical and Electronics Engineers Inc.

T2 - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)

Y2 - 15 May 2023 through 17 May 2023

ER -

ID: 41994955