Методи сканування образу docker контейнерів на предмет вразливостей безпеки

dc.citation.epage43
dc.citation.issue2
dc.citation.journalTitleКомп'ютерні системи та мережі
dc.citation.spage35
dc.citation.volume6
dc.contributor.affiliationНаціональний університет “Львівська політехніка”
dc.contributor.affiliationНаціональний університет “Львівська політехніка”
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.authorДарієнко, Д. Г.
dc.contributor.authorКогут, Н. М.
dc.contributor.authorDrienko, D.
dc.contributor.authorKohut, N.
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2025-12-11T11:15:28Z
dc.date.created2024-10-10
dc.date.issued2024-10-10
dc.description.abstractЗ розвитком контейнеризованих середовищ питання безпеки стає критично важливим для розгортання додатків. У цій статті проведено порівняльний аналіз статичного та динамічного методів сканування образів Docker контейнерів. Статичний аналіз використовується для виявлення потенційних вразливостей до розгортання контейнера, тоді як динамічний аналіз проводиться в ізольованому середовищі під час виконання, забезпечуючи надійність продукту. Порівняно роботу сканерів Trivy, JFrog Xray, Snyk і Docker Scout, підкреслено їх переваги, недоліки та ефективність у різних умовах. Доведено, що Trivy знаходить найбільше вразливостей серед протестованих сканерів. Snyk та Xray видають приблизно однакові результати, проте Xray також перевіряє шифрування важливих даних, таких як паролі. Docker Scout виявився най- слабшим представником, єдиною перевагою якого є відкритий доступ результатів, які можна проаналізувати без завантаження образу на сервер чи персональний комп’ютер розробника. Особливу увагу приділено статичному аналізу через його ширше покриття вразливостей, включаючи операційні пакети та залежності додатків. Продемонстровано різницю в оцінці критичності вразливостей різними сканерами, а також обговорено, як велика кількість знайдених вразливостей не завжди означає високий рівень ризику. На основі проведеного аналізу запропоновано критерії для вибору сканера, щоб уникнути витоку інформації через непомічені вразливості.
dc.description.abstractWith the development of containerized environments, the issue of security is becoming critical for application deployments. This article provides a comparative analysis of static and dynamic methods for scanning Docker container images. Static analysis is used to identify potential vulnerabilities before container deployment, while dynamic analysis is performed in an isolated environment at runtime, ensuring product reliability. The work of Trivy, JFrog Xray, Snyk, and Docker Scout scanners is compared, and their advantages, disadvantages, and effectiveness in different conditions are emphasized. Trivy has been proven to find the most vulnerabilities among the scanners tested. Snyk and Xray give similar results, but Xray also checks for encryption of important data such as passwords. Docker Scout turned out to be the weakest representative, the only advantage of which is open access to results that can be analyzed without uploading an image to the server or personal developers’ computer. Particular attention is paid to static analysis due to its broader coverage of vulnerabilities, including operating packages and application dependencies. The difference in the assessment of the criticality of vulnerabilities by different scanners is demonstrated, and it is also discussed how many vulnerabilities found do not always mean a high level of risk. Based on the analysis, criteria for choosing a scanner are proposed to avoid information leakage due to unnoticed vulnerabilities.
dc.format.extent35-43
dc.format.pages9
dc.identifier.citationДарієнко Д. Г. Методи сканування образу docker контейнерів на предмет вразливостей безпеки / Д. Г. Дарієнко, Н. М. Когут // Комп'ютерні системи та мережі. — Львів : Видавництво Львівської політехніки, 2024. — Том 6. — № 2. — С. 35–43.
dc.identifier.citation2015Дарієнко Д. Г., Когут Н. М. Методи сканування образу docker контейнерів на предмет вразливостей безпеки // Комп'ютерні системи та мережі, Львів. 2024. Том 6. № 2. С. 35–43.
dc.identifier.citationenAPADrienko, D., & Kohut, N. (2024). Metody skanuvannia obrazu docker konteineriv na predmet vrazlyvostei bezpeky [Docker container image scanning methods on the subject of security vulnerabilities]. Computer Systems and Networks, 6(2), 35-43. Lviv Politechnic Publishing House. [in Ukrainian].
dc.identifier.citationenCHICAGODrienko D., Kohut N. (2024) Metody skanuvannia obrazu docker konteineriv na predmet vrazlyvostei bezpeky [Docker container image scanning methods on the subject of security vulnerabilities]. Computer Systems and Networks (Lviv), vol. 6, no 2, pp. 35-43 [in Ukrainian].
dc.identifier.doiDOI: https://doi.org/10.23939/csn2024.02.035
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/123991
dc.language.isouk
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofКомп'ютерні системи та мережі, 2 (6), 2024
dc.relation.ispartofComputer Systems and Networks, 2 (6), 2024
dc.relation.references1. Ahmed A. and Pierre G.«Docker-pi: Docker container deployment in fog computing infrastructures» International Journal of Cloud Computing, vol. 1, no. 6, 2019. DOI: 10.1109/EDGE.2018.00008
dc.relation.references2.. Alyas T, Ali S., Khan H., Samad A., Alissa K . та. Saleem M.. «Container Performance and Vulnerability Management for Container Security Using Docker Engine». Security and Communication Networks, 2022. DOI:10.1155/2022/6819002
dc.relation.references3. Jain V., Singh B., Khenwar M. та Sharma M. «Static Vulnerability Analysis of Docker Images» в IOP Conference Series: Materials Science and Engineering, Jaipur, India, 2021. DOI: 10.1088/1757-899X/1131/1/012018
dc.relation.references4. Efe, Doç. Dr. Ahmet & Aslan, Ulaş & Kara, Aytekin. (2020). Securing Vulnerabilities in Docker Images. International Journal of Innovative Engineering Applications. 4. 31-39. DOI: 10.46460/ijiea.617181.
dc.relation.references5. Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities. (n.d.). Retrieved from banyanops Available https://www.banyansecurity.io/blog/over-30-of-official-images-in-docker-hub-contain-highpriority- security-vulnerabilities/ (Accessed: 18 March 2024)
dc.relation.references6. Martin R. A. "Managing vulnerabilities in networked systems," in Computer, vol. 34, no. 11, pp. 32-38, Nov.2001, DOI: 10.1109/2.963441.
dc.relation.references7. Docker, Inc., «Overview of Docker Desktop» Docker, Inc., [Онлайновий]. Available:https://docs.docker.com/desktop/. (Accessed: 18 March 2024)
dc.relation.references8. Hashemi-Pour C., Bigelow S. J. та Courtemanche M. «DEFINITION Docker, » TechTarget., [Онлайновий].Available: https://www.techtarget.com/searchitoperations/definition/Docker/. (Accessed: 18 March 2024)
dc.relation.references9. Five Security concerns when using docker. (n.d.). Retrieved from Oreilly [Онлайновий]. Available:https://www.oreilly.com/ideas/five-security-concerns-when-using-docker (Accessed: 18 March 2024)
dc.relation.references10. Aqua Security Software Ltd., «Data Sources - Trivy,» Aqua Security Software Ltd., [Онлайновий]. Available:https://aquasecurity.github.io/trivy/v0.32/docs/vulnerability/detection/data-source/. (Accessed: 18 March 2024)
dc.relation.references11. Aqua Security Software Ltd., «Data Sources - Trivy,» Aqua Security Software Ltd., [Онлайновий]. Available:https://aquasecurity.github.io/trivy/v0.32/docs/vulnerability/detection/data-source/. (Accessed: 18 March 2024)
dc.relation.references12. Canonical Ltd., «CVE reports, » Canonical Ltd., [Онлайновий]. Available: https://ubuntu.com/security/cves/.(Accessed: 18 March 2024)
dc.relation.references13. Amazon Web Services, Inc., «Amazon Linux Security Center, » Amazon Web Services, Inc., [Онлайновий].Available: https://alas.aws.amazon.com/. (Accessed: 18 March 2024)
dc.relation.references14. Doan P. та Jung S., «DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning» Computers,Materials &Continua, т. 72, №1, pp. 1699-1711, 2022. DOI: 10.32604/cmc.2022.025096
dc.relation.references15. Ugale S. та Potgantwar A. «Container Security in Cloud Environments: A Comprehensive Analysis and FutureDirections for DevSecOps» в RAiSE, Woodhouse, Leeds, 2023. DOI: 10.3390/engproc2023059057
dc.relation.references16. Huang D., Cui H., Wen S. and Huang C. "Security Analysis and Threats Detection Techniques on DockerContainer," 2019 IEEE 5th International Conference on Computer and Communications (ICCC), Chengdu, China,2019, pp. 1214-1220, DOI: 10.1109/ICCC47050.2019.9064441
dc.relation.references17. Brady K., Moon S., Nguyen T. and Coffman J. "Docker Container Security in Cloud Computing" 2020 10thAnnual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020, pp. 0975-0980,DOI: 10.1109/CCWC47524.2020.9031195.
dc.relation.references18. JFrog Ltd., «JFROG Artifactory» JFrog Ltd., [Онлайновий]. Available: https://jfrog.com/artifactory/.(Accessed: 18 March 2024)
dc.relation.references19. JFrog Ltd., «JFrog Xray» JFrog Ltd., [Онлайновий]. Available: https://jfrog.com/help/r/get-started-with-thejfrog-platform/jfrog-xray. (Accessed: 18 March 2024)
dc.relation.references20. Aqua Security Software Ltd., «Trivy Documentation,» Aqua Security Software Ltd., [Онлайновий]. Available:https://aquasecurity.github.io/trivy/v0.49/. (Accessed: 18 March 2024)
dc.relation.references21. Snyk Limited, «Snyk Vulnerability Database», Snyk Limited [Онлайновий]. Available: https://security.snyk.io/.(Accessed: 18 March 2024)
dc.relation.references22. Docker, Inc., «Docker Hub» Docker, Inc., [Онлайновий]. Available: https://hub.docker.com/. (Accessed: 18March 2024)
dc.relation.references23. Red Hat, Inc., «CVE-2023-24538» Red Hat, Inc., [Онлайновий]. Available:https://access.redhat.com/security/cve/cve-2023-24538. (Accessed: 18 March 2024)
dc.relation.referencesen1. Ahmed A. and Pierre G."Docker-pi: Docker container deployment in fog computing infrastructures" International Journal of Cloud Computing, vol. 1, no. 6, 2019. DOI: 10.1109/EDGE.2018.00008
dc.relation.referencesen2.. Alyas T, Ali S., Khan H., Samad A., Alissa K . ta. Saleem M.. "Container Performance and Vulnerability Management for Container Security Using Docker Engine". Security and Communication Networks, 2022. DOI:10.1155/2022/6819002
dc.relation.referencesen3. Jain V., Singh B., Khenwar M. ta Sharma M. "Static Vulnerability Analysis of Docker Images" v IOP Conference Series: Materials Science and Engineering, Jaipur, India, 2021. DOI: 10.1088/1757-899X/1131/1/012018
dc.relation.referencesen4. Efe, Doç. Dr. Ahmet & Aslan, Ulaş & Kara, Aytekin. (2020). Securing Vulnerabilities in Docker Images. International Journal of Innovative Engineering Applications. 4. 31-39. DOI: 10.46460/ijiea.617181.
dc.relation.referencesen5. Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities. (n.d.). Retrieved from banyanops Available https://www.banyansecurity.io/blog/over-30-of-official-images-in-docker-hub-contain-highpriority- security-vulnerabilities/ (Accessed: 18 March 2024)
dc.relation.referencesen6. Martin R. A. "Managing vulnerabilities in networked systems," in Computer, vol. 34, no. 11, pp. 32-38, Nov.2001, DOI: 10.1109/2.963441.
dc.relation.referencesen7. Docker, Inc., "Overview of Docker Desktop" Docker, Inc., [Onlainovii]. Available:https://docs.docker.com/desktop/. (Accessed: 18 March 2024)
dc.relation.referencesen8. Hashemi-Pour C., Bigelow S. J. ta Courtemanche M. "DEFINITION Docker, " TechTarget., [Onlainovii].Available: https://www.techtarget.com/searchitoperations/definition/Docker/. (Accessed: 18 March 2024)
dc.relation.referencesen9. Five Security concerns when using docker. (n.d.). Retrieved from Oreilly [Onlainovii]. Available:https://www.oreilly.com/ideas/five-security-concerns-when-using-docker (Accessed: 18 March 2024)
dc.relation.referencesen10. Aqua Security Software Ltd., "Data Sources - Trivy," Aqua Security Software Ltd., [Onlainovii]. Available:https://aquasecurity.github.io/trivy/v0.32/docs/vulnerability/detection/data-source/. (Accessed: 18 March 2024)
dc.relation.referencesen11. Aqua Security Software Ltd., "Data Sources - Trivy," Aqua Security Software Ltd., [Onlainovii]. Available:https://aquasecurity.github.io/trivy/v0.32/docs/vulnerability/detection/data-source/. (Accessed: 18 March 2024)
dc.relation.referencesen12. Canonical Ltd., "CVE reports, " Canonical Ltd., [Onlainovii]. Available: https://ubuntu.com/security/cves/.(Accessed: 18 March 2024)
dc.relation.referencesen13. Amazon Web Services, Inc., "Amazon Linux Security Center, " Amazon Web Services, Inc., [Onlainovii].Available: https://alas.aws.amazon.com/. (Accessed: 18 March 2024)
dc.relation.referencesen14. Doan P. ta Jung S., "DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning" Computers,Materials &Continua, V. 72, No 1, pp. 1699-1711, 2022. DOI: 10.32604/cmc.2022.025096
dc.relation.referencesen15. Ugale S. ta Potgantwar A. "Container Security in Cloud Environments: A Comprehensive Analysis and FutureDirections for DevSecOps" v RAiSE, Woodhouse, Leeds, 2023. DOI: 10.3390/engproc2023059057
dc.relation.referencesen16. Huang D., Cui H., Wen S. and Huang C. "Security Analysis and Threats Detection Techniques on DockerContainer," 2019 IEEE 5th International Conference on Computer and Communications (ICCC), Chengdu, China,2019, pp. 1214-1220, DOI: 10.1109/ICCC47050.2019.9064441
dc.relation.referencesen17. Brady K., Moon S., Nguyen T. and Coffman J. "Docker Container Security in Cloud Computing" 2020 10thAnnual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020, pp. 0975-0980,DOI: 10.1109/CCWC47524.2020.9031195.
dc.relation.referencesen18. JFrog Ltd., "JFROG Artifactory" JFrog Ltd., [Onlainovii]. Available: https://jfrog.com/artifactory/.(Accessed: 18 March 2024)
dc.relation.referencesen19. JFrog Ltd., "JFrog Xray" JFrog Ltd., [Onlainovii]. Available: https://jfrog.com/help/r/get-started-with-thejfrog-platform/jfrog-xray. (Accessed: 18 March 2024)
dc.relation.referencesen20. Aqua Security Software Ltd., "Trivy Documentation," Aqua Security Software Ltd., [Onlainovii]. Available:https://aquasecurity.github.io/trivy/v0.49/. (Accessed: 18 March 2024)
dc.relation.referencesen21. Snyk Limited, "Snyk Vulnerability Database", Snyk Limited [Onlainovii]. Available: https://security.snyk.io/.(Accessed: 18 March 2024)
dc.relation.referencesen22. Docker, Inc., "Docker Hub" Docker, Inc., [Onlainovii]. Available: https://hub.docker.com/. (Accessed: 18March 2024)
dc.relation.referencesen23. Red Hat, Inc., "CVE-2023-24538" Red Hat, Inc., [Onlainovii]. Available:https://access.redhat.com/security/cve/cve-2023-24538. (Accessed: 18 March 2024)
dc.relation.urihttps://www.banyansecurity.io/blog/over-30-of-official-images-in-docker-hub-contain-highpriority-
dc.relation.urihttps://docs.docker.com/desktop/
dc.relation.urihttps://www.techtarget.com/searchitoperations/definition/Docker/
dc.relation.urihttps://www.oreilly.com/ideas/five-security-concerns-when-using-docker
dc.relation.urihttps://aquasecurity.github.io/trivy/v0.32/docs/vulnerability/detection/data-source/
dc.relation.urihttps://ubuntu.com/security/cves/.(Accessed:
dc.relation.urihttps://alas.aws.amazon.com/
dc.relation.urihttps://jfrog.com/artifactory/.(Accessed:
dc.relation.urihttps://jfrog.com/help/r/get-started-with-thejfrog-platform/jfrog-xray
dc.relation.urihttps://aquasecurity.github.io/trivy/v0.49/
dc.relation.urihttps://security.snyk.io/.(Accessed:
dc.relation.urihttps://hub.docker.com/
dc.relation.urihttps://access.redhat.com/security/cve/cve-2023-24538
dc.rights.holder© Національний університет „Львівська політехніка“, 2024
dc.rights.holder© Дарієнко Д. Г., Когут Н. М., 2024
dc.subjectзахист інформації
dc.subjectкібербезпека
dc.subjectконтейнер
dc.subjectdocker
dc.subjectсканування
dc.subjectвразливість безпеки
dc.subjectinformation protection
dc.subjectcybersecurity
dc.subjectcontainer
dc.subjectdocker
dc.subjectscanning
dc.subjectsecurity vulnerability
dc.subject.udc004.75
dc.subject.udc004.8
dc.titleМетоди сканування образу docker контейнерів на предмет вразливостей безпеки
dc.title.alternativeDocker container image scanning methods on the subject of security vulnerabilities
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2024v6n2_Drienko_D-Docker_container_image_scanning_35-43.pdf
Size:
1011.51 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.78 KB
Format:
Plain Text
Description: