Alex Borhani (2017). Anomaly Detection, Alerting, and
Incident Response for Containers. SANS Institute In-
foSec Reading Room, (GIAC GCIH Gold Certifica-
tion).
Combe, T., Martin, A., and Di Pietro, R. (2016). To Docker
or Not to Docker: A Security Perspective. IEEE Cloud
Computing, 3(5):54–62.
Dymshits, M., Myara, B., and Tolpin, D. (2017). Process
monitoring on sequences of system call count vectors.
Proceedings - International Carnahan Conference on
Security Technology, 2017-October:1–5.
Felter, W., Ferreira, A., Rajamony, R., and Rubio, J. (2015).
An updated performance comparison of virtual ma-
chines and linux containers. In 2015 IEEE Interna-
tional Symposium on Performance Analysis of Sys-
tems and Software (ISPASS), pages 171–172.
Fleming, M. (2017). A thorough introduction to ebpf. [ON-
LINE] Available at: https://lwn.net/Articles/740157/.
[Accessed 14 January 2019].
Forrest, S., Hofmeyr, S., Somayaji, A., and Longstaff, T.
(1996). A sense of self for Unix processes. In Pro-
ceedings 1996 IEEE Symposium on Security and Pri-
vacy, pages 120–128.
Gantikow, H., Reich, C., Knahl, M., and Clarke, N. (2016).
Providing security in container-based HPC runtime
environments. Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intel-
ligence and Lecture Notes in Bioinformatics), 9945
LNCS:685–695.
Gao, X., Gu, Z., Kayaalp, M., Pendarakis, D., and Wang, H.
(2017). ContainerLeaks: Emerging Security Threats
of Information Leakages in Container Clouds. Pro-
ceedings - 47th Annual IEEE/IFIP International Con-
ference on Dependable Systems and Networks, DSN
2017, pages 237–248.
Jacobsen, D. M. and Canon, R. S. (2015). Contain This,
Unleashing Docker for HPC. Cray User Group 2015,
page 14.
Kang, D.-k., Fuller, D., and Honavar, V. (2005). Learning
Classifiers for Misuse Detection Using a Bag of Sys-
tem Calls Representation. Proceedings of the 2005
IEEE Workshop on Information Assurance and Secu-
rity United States Military Academy, West Point, NY,
pages 511–516.
Kolosnjaji, B., Zarras, A., Webster, G., and Eckert, C.
(2016). Deep learning for classification of malware
system call sequences. In Lecture Notes in Computer
Science (including subseries Lecture Notes in Artifi-
cial Intelligence and Lecture Notes in Bioinformatics),
volume 9992 LNAI, pages 137–149.
Kopytov, A. (2019). Sysbench: Scriptable database and sys-
tem performance benchmark. [ONLINE] Available at:
https://github.com/akopytov/sysbench. [Accessed 14
January 2019].
Koucham, O., Rachidi, T., and Assem, N. (2015). Host
intrusion detection using system call argument-based
clustering combined with Bayesian classification. In-
telliSys 2015 - Proceedings of 2015 SAI Intelligent
Systems Conference, pages 1010–1016.
Kurtzer, G. M., Sochat, V., Bauer, M. W., Favre, T., Capota,
M., and Chakravarty, M. (2017). Singularity: Scien-
tific containers for mobility of compute. Plos One,
12(5):e0177459.
Lei, L., Sun, J., Sun, K., Shenefiel, C., Ma, R., Wang, Y.,
and Li, Q. (2017). SPEAKER: Split-phase execution
of application containers. In Lecture Notes in Com-
puter Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinfor-
matics), volume 10327 LNCS, pages 230–251.
Maggi, F., Matteucci, M., and Zanero, S. (2010). Detecting
intrusions through system call sequence and argument
analysis. IEEE Transactions on Dependable and Se-
cure Computing, 7(4):381–395.
Mattetti, M., Shulman-Peleg, A., Allouche, Y., Corradi,
A., Dolev, S., and Foschini, L. (2015). Securing the
infrastructure and the workloads of linux containers.
2015 IEEE Conference on Communications and Net-
workSecurity, CNS 2015, (Spc):559–567.
Nikolai, J. (2014). Hypervisor-based cloud intrusion detec-
tion system. 2014 International Conference on Com-
puting, Networking and Communications (ICNC).
OWASP (2018). Owasp webgoat project. [ONLINE]
Available at: https://www.owasp.org/index.php/
Category:OWASP WebGoat Project. [Accessed 14
January 2019].
Portworx (2018). 2018 Container Adoption Survey. Tech-
nical report.
Priedhorsky, R., Randles, T. C., and Randles, T. (2017).
Charliecloud: Unprivileged containers for user-
defined software stacks in HPC. SC17: International
Conference for High Performance Computing, Net-
working, Storage and Analysis, 17:p1–10.
Stoler, N. (2019). How i hacked play-with-docker and re-
motely ran code on the host. [ONLINE] Available at:
https://www.cyberark.com/threat-research-blog/how-
i-hacked-play-with-docker-and-remotely-ran-code-
on-the-host/. [Accessed 14 January 2019].
Sysdig (2018). Docker Usage Report 2018 - An inside look
at shifting container usage trends.
Sysdig (2019a). Sysdig falco: Behavioral activity moni-
toring with container support. [ONLINE] Available
at: https://github.com/draios/oss-falco. [Accessed 14
January 2019].
Sysdig (2019b). Sysdig: Linux system exploration
and troubleshooting tool with first class sup-
port for containers. [ONLINE] Available at:
https://github.com/draios/sysdig. [Accessed 14 Jan-
uary 2019].
Walsh, D. (2016). Container tidbits: Adding ca-
pabilities to a container. [ONLINE] Available
at: https://rhelblog.redhat.com/2016/11/30/container-
tidbits-adding-capabilities-to-a-container/. [Accessed
10 January 2019].
CLOSER 2019 - 9th International Conference on Cloud Computing and Services Science
550