Hofmeyr, S. A., Forrest, S., and Somayaji, A. (1998). Intru-
sion detection using sequences of system calls. Jour-
nal of computer security, 6(3):151–180.
Jang, S., Song, S., Tak, B., Suneja, S., Le, M. V., Yue, C.,
and Williams, D. (2022). Secquant: Quantifying con-
tainer system call exposure. In European Symposium
on Research in Computer Security, pages 145–166.
Springer.
Kerrisk, M. (2022). Strace Documentation.
https://man7.org/linux/man-pages/man1/
strace.1.html. [Online, last accessed: May 28,
2022].
Kuang, L. and Zulkernine, M. (2008). An intrusion-tolerant
mechanism for intrusion detection systems. In ARES
2008, pages 319–326. IEEE.
Kubernetes (2023). https://kubernetes.io/docs/
concepts/overview/components/. [Online, last
accessed: May 14, 2023].
Kubernets.io (2022). Restrict a Container’s Syscalls
with seccomp. https://kubernetes.io/docs/
tutorials/security/seccomp/. [Online, last ac-
cessed: August 10, 2022].
Lancini, M. (June 30, 2020). The Current
State of Kubernetes Threat Modelling.
https://blog.marcolancini.it/2020/
blog-kubernetes-threat-modelling/. [On-
line, accessed May 16, 2023].
Lee, H., Kwon, S., and Lee, J.-H. (2023a). Experimental
analysis of security attacks for docker container com-
munications. Electronics, 12(4):940.
Lee, K., Lee, J., and Yim, K. (2023b). Classification and
analysis of malicious code detection techniques based
on the apt attack. Applied Sciences, 13(5):2894.
Lin, X., Lei, L., Wang, Y., Jing, J., Sun, K., and Zhou, Q.
(2018). A measurement study on linux container secu-
rity: Attacks and countermeasures. In ACSAC 2018,
pages 418–429.
minikube (2023). https://minikube.sigs.k8s.io/
docs/start/. [Online, last accessed: May 15, 2023].
Redhat (2023). State of kubernetes security report
2023. https://www.redhat.com/en/resources/state-
kubernetes-security-report-2023.
Sarkale, V. V., Rad, P., and Lee, W. (2017). Secure cloud
container: Runtime behavior monitoring using most
privileged container (mpc). In IEEE CSCloud 2017,
pages 351–356. IEEE.
seed-labs 2.0 (2022a). Cross-Site Request Forgery Attack
Lab. https://seedsecuritylabs.org/Labs\_20.
04/Web/Web\_CSRF\_Elgg/. [Online, last accessed:
May 3, 2022].
seed-labs 2.0 (2022b). Cross-Site Scripting Attack Lab
(Elgg). https://seedsecuritylabs.org/Labs\
_20.04/Web/Web\_XSS\_Elgg/. [Online, last ac-
cessed: May 4, 2022].
seed-labs 2.0 (2022c). SQL Injection Attack Lab.
https://seedsecuritylabs.org/Labs\_20.
04/Web/Web\_SQL\_Injection/. [Online, last
accessed: May 3, 2022].
SeedLab (2022). Seed lab documentation. https://
seedsecuritylabs.org/labs.html. [Online, last
accessed: May 2, 2022].
Son, S., McKinley, K. S., and Shmatikov, V. (2013). Diglos-
sia: detecting code injection attacks with precision
and efficiency. In ACM CCS 2013, pages 1181–1192.
Song, S., Suneja, S., Le, M. V., and Tak, B. (2023). On
the value of sequence-based system call filtering for
container security. In IEEE/ACM UCC 2023, pages
296–307. IEEE.
Souppaya, M., Morello, J., and Scarfone, K. (2017). Ap-
plication container security guide. Technical report,
National Institute of Standards and Technology.
Sultan, S., Ahmad, I., and Dimitriou, T. (2019). Container
security: Issues, challenges, and the road ahead. IEEE
access, 7:52976–52996.
Sysdig (2022). Sysdig Documentation. https://docs.
sysdig.com/en/. [Online, last accessed: June 15,
2022].
Tunde-Onadele, O., He, J., Dai, T., and Gu, X. (2019). A
study on container vulnerability exploit detection. In
IEEE IC2E 2019), pages 121–127. IEEE.
VS, D. P., Sethuraman, S. C., and Khan, M. K. (2023). Con-
tainer security: Precaution levels, mitigation strate-
gies, and research perspectives. Computers & Secu-
rity, page 103490.
Wong, A. Y., Chekole, E. G., Ochoa, M., and Zhou, J.
(2023). On the security of containers: Threat mod-
eling, attack analysis, and mitigation strategies. Com-
puters & Security, 128:103140.
Yarygina, T. and Otterstad, C. (2018). A game of microser-
vices: Automated intrusion response. In DAIS 2018,
pages 169–177. Springer.
CLOSER 2024 - 14th International Conference on Cloud Computing and Services Science
26