Design and implementation of vulnerability verification framework based on Docker

Vulnerability is an important object in the research of information security, but there are many kinds of vulnerabilities at present, and the verification is complex. In view of the difficulties of building security vulnerabilities and the difficulties of vulnerabilities reappearing, a framework sys...

Full description

Bibliographic Details
Main Authors: Chen Yiming, Kou Xiaoqiang, Wang Yongli
Format: Article
Language:zho
Published: National Computer System Engineering Research Institute of China 2018-11-01
Series:Dianzi Jishu Yingyong
Subjects:
Online Access:http://www.chinaaet.com/article/3000094104
_version_ 1819102229314928640
author Chen Yiming
Kou Xiaoqiang
Wang Yongli
author_facet Chen Yiming
Kou Xiaoqiang
Wang Yongli
author_sort Chen Yiming
collection DOAJ
description Vulnerability is an important object in the research of information security, but there are many kinds of vulnerabilities at present, and the verification is complex. In view of the difficulties of building security vulnerabilities and the difficulties of vulnerabilities reappearing, a framework system is designed to deploy vulnerabilities in containers based on Docker virtualization technology, and the corresponding verification script is used to implement the framework system. The framework system verification process needs to provide Dockerfile file or Docker mirrors, as well as matching vulnerability verification scripts. Firstly, the system runs a Docker container with a vulnerability program. The framework then calls the verification or attack scripts that match the vulnerability to verify the availability. After testing, the system can greatly improve the speed of the vulnerabilities recovery, and reduce the difficulty and the technical threshold for the reappearing of the vulnerabilities.
first_indexed 2024-12-22T01:31:14Z
format Article
id doaj.art-436eb081bef1487e81a8e7f942d47ace
institution Directory Open Access Journal
issn 0258-7998
language zho
last_indexed 2024-12-22T01:31:14Z
publishDate 2018-11-01
publisher National Computer System Engineering Research Institute of China
record_format Article
series Dianzi Jishu Yingyong
spelling doaj.art-436eb081bef1487e81a8e7f942d47ace2022-12-21T18:43:29ZzhoNational Computer System Engineering Research Institute of ChinaDianzi Jishu Yingyong0258-79982018-11-0144119910110.16157/j.issn.0258-7998.1807533000094104Design and implementation of vulnerability verification framework based on DockerChen Yiming0Kou Xiaoqiang1Wang Yongli2National Computer System Engineering Reasearch Institute of China,Beijing 100083,ChinaNational Computer System Engineering Reasearch Institute of China,Beijing 100083,ChinaNational Computer System Engineering Reasearch Institute of China,Beijing 100083,ChinaVulnerability is an important object in the research of information security, but there are many kinds of vulnerabilities at present, and the verification is complex. In view of the difficulties of building security vulnerabilities and the difficulties of vulnerabilities reappearing, a framework system is designed to deploy vulnerabilities in containers based on Docker virtualization technology, and the corresponding verification script is used to implement the framework system. The framework system verification process needs to provide Dockerfile file or Docker mirrors, as well as matching vulnerability verification scripts. Firstly, the system runs a Docker container with a vulnerability program. The framework then calls the verification or attack scripts that match the vulnerability to verify the availability. After testing, the system can greatly improve the speed of the vulnerabilities recovery, and reduce the difficulty and the technical threshold for the reappearing of the vulnerabilities.http://www.chinaaet.com/article/3000094104information securityvulnerability verificationDockervirtualization
spellingShingle Chen Yiming
Kou Xiaoqiang
Wang Yongli
Design and implementation of vulnerability verification framework based on Docker
Dianzi Jishu Yingyong
information security
vulnerability verification
Docker
virtualization
title Design and implementation of vulnerability verification framework based on Docker
title_full Design and implementation of vulnerability verification framework based on Docker
title_fullStr Design and implementation of vulnerability verification framework based on Docker
title_full_unstemmed Design and implementation of vulnerability verification framework based on Docker
title_short Design and implementation of vulnerability verification framework based on Docker
title_sort design and implementation of vulnerability verification framework based on docker
topic information security
vulnerability verification
Docker
virtualization
url http://www.chinaaet.com/article/3000094104
work_keys_str_mv AT chenyiming designandimplementationofvulnerabilityverificationframeworkbasedondocker
AT kouxiaoqiang designandimplementationofvulnerabilityverificationframeworkbasedondocker
AT wangyongli designandimplementationofvulnerabilityverificationframeworkbasedondocker