A Node Security Determination Method Based on Container Monitoring

Lijun Wang,Haodong Zou,Ling Wang,Xin Chen,Jinghang Yu
DOI: https://doi.org/10.1109/ICEACE60673.2023.10442536
2023-01-01
Abstract:In recent years, cloud computing technology has been widely applied, and virtualization technology is an important supporting technology. Different from virtual machine technology, container technology has been widely used due to its advantages of elasticity, scalability, lightweight, high availability, high resource utilization, agility, and support for rapid dynamic expansion. However, it has also brought new container security issues. This paper proposes a node security determination method to evaluate container security to achieve node security determination.
What problem does this paper attempt to address?