The present disclosure generally relates to containerized applications, and more specifically to ensuring security and compliance for containerized applications.
A software container is an instance of a user-space running an application within the operating system (OS) of a host device (e.g., a server). Software containers enable operating-system-level virtualization in which the OS kernel allows the existence of multiple isolated software containers.
A software container (or a container) provides an executable environment with a complete filesystem. The filesystem may contain code, runtime, system tools, system libraries, and so on. That is, execution of a software container can be the same regardless of the underlying infrastructure. A Docker is one popular existing platform for creating, migrating, managing, and deploying software containers.
A software container, unlike a virtual machine, does not require or include a separate operating system. Rather, the container relies on the kernel's functionality and uses hardware resources (CPU, memory, I/O, network, etc.) and separate namespaces to isolate the application's view of the operating system. A software container can access the OS kernel's virtualization features either directly or indirectly. For example, Linux kernel can be accessed directly using the libcontainer library or indirectly using the libvirt service.
As demonstrated in
The base image 210 (and its layers 215) can be shared across different software containers. Thus, only the container layer 220 differentiates between one software container and another. The container layer 220 is a readable and writable layer where all data written to the software container 200 is saved in the container layer 220. When the software container 200 is deleted, the writable container layer 220 is also deleted, and the base image 210 remains unchanged. As such, the software container 200 and other software containers (not shown) can share access to the same base image 210, where each software container has its own data state. In the example demonstrated in
The popularity of software containers has been increased due to the easy integration with cloud-computing platform (e.g., Amazon® Web Services, Google® Cloud Platform, Microsoft® Azure, etc.). On such platforms, service providers can offer operating systems to run services and applications. With that said, the increasing reliance on software containers increases the need for secured execution.
Container images are typically uploaded and stored in image registries that may or may not be managed by an organization. Further, the base images are used across many container images. As such, base images can be developed and uploaded to image registries by programmers who are associated with the organization seeking to use the image. Therefore, hackers can take advantage of program images to include malicious code. Thus, such images can be vulnerable when integrated in a software container. Such malicious code may carry any type of malware including, for example, computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and the like. Further, such malicious code may be a source for an ATP attack or a distributed denial of service (DDoS) attack when a software container is executed with an infected or malicious image.
To limit the risk associated with container images stored in registries, several security and/or auditing processes can be performed prior to uploading a container image in a register. However, such processes are very limited in the type of vulnerabilities that they can check. Further, a container image determined to be safe can be later modified by a hacker (or an innocent programmer) to include code that can harm the execution environment.
Typically, a software container (and, thus, each application) can be secured separately from other software containers (and applications) during runtime execution. Thus, one software container cannot access resources of other software containers. However, the isolation of software containers cannot prevent the execution of malicious code. Malicious activity by software containers can occur through exploitation of legitimate programs or services in a container and improper configuration. Improper configuration may result in, for example, privilege escalations. Detection of such vulnerabilities occurs only at runtime, i.e., during the execution of the software containers.
Existing security solutions are not designed to detect vulnerabilities in images of software containers. Specifically, images have a certain structure that cannot be processed by existing security solutions. Further, existing solutions cannot determine or predict how the container image (being a static file) would behave when it is being executed. For example, a conventional antivirus tool cannot scan container images to detect, e.g., which folders are used for writing files or which types of files are to be written to each folder.
It would therefore be therefore advantageous to provide a solution that would secure the execution of software containers.
A summary of several example embodiments of the disclosure follows. This summary is provided for the convenience of the reader to provide a basic understanding of such embodiments and does not wholly define the breadth of the disclosure. This summary is not an extensive overview of all contemplated embodiments, and is intended to neither identify key or critical elements of all embodiments nor to delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more embodiments in a simplified form as a prelude to the more detailed description that is presented later. For convenience, the term “some embodiments” may be used herein to refer to a single embodiment or multiple embodiments of the disclosure.
Certain embodiments disclosed herein include a method for securing execution of software containers using security profiles. The method comprises exporting a container image to a host device from a container image source, wherein the container image includes resources utilized to execute a corresponding application container; generating a security profile for the container image, wherein the generated security profile indicates at least a list of permissible filesystem actions, wherein each permissible filesystem action is an action performed with respect to at least one filesystem resource; monitoring an operation of a runtime execution of the application container; and detecting a violation of the security profile based on the monitored operation.
Certain embodiments disclosed herein also include a non-transitory computer readable medium having stored thereon causing a processing circuitry to execute a process, the process comprising: exporting a container image to a host device from a container image source, wherein the container image includes resources utilized to execute a corresponding application container; generating a security profile for the container image, wherein the generated security profile indicates at least a list of permissible filesystem actions, wherein each permissible filesystem action is an action performed with respect to at least one filesystem resource; monitoring an operation of a runtime execution of the application container; and detecting a violation of the security profile based on the monitored operation.
Certain embodiments disclosed herein also include a system for securing execution of software containers using security profiles. The system comprises a processing circuitry; and a memory, the memory containing instructions that, when executed by the processing circuitry, configure the system to: export a container image to a host device from a container image source, wherein the container image includes resources utilized to execute a corresponding application container; generate a security profile for the container image, wherein the generated security profile indicates at least a list of permissible filesystem actions, wherein each permissible filesystem action is an action performed with respect to at least one filesystem resource; monitor an operation of a runtime execution of the application container; and detecting a violation of the security profile based on the monitored operation.
The subject matter disclosed herein is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other objects, features, and advantages of the invention will be apparent from the following detailed description taken in conjunction with the accompanying drawings.
It is important to note that the embodiments disclosed herein are only examples of the many advantageous uses of the innovative teachings herein. In general, statements made in the specification of the present application do not necessarily limit any of the various claimed embodiments. Moreover, some statements may apply to some inventive features but not to others. In general, unless otherwise indicated, singular elements may be in plural and vice versa with no loss of generality. In the drawings, like numerals refer to like parts through several views.
By way of example, the various disclosed embodiments include a method and system for profiling and securing execution of software containers using security profiles. A security profile is created for a software container based on permissible (whitelisted) filesystem actions for the software container. Such permissible filesystem actions may be determined based on the context of the application executed the APP container. Each such action defines which filesystem resources can be accessed by the APP container during runtime. A filesystem resource may be, but is not limited to, a file, a directory, a sub directory, a memory page, a cache section, a folder, a volume, a library, a secret, and so on. The security profile may further include impermissible (blacklisted) filesystem actions.
In an embodiment, the security profile is created based on static analysis of all layers in a container image prior to runtime of an APP container. To this end, an application to be executed by the APP container, a configuration for the application, one or more environmental variables, or a combination thereof, are analyzed to determine permissible filesystem actions for the APP container. A container image is a static file and a runtime instance of the container image is an APP container. Alternatively or collectively, the security profile may be created based on static analysis of common files to be used by the APP container at runtime.
In another embodiment, the security profile is created based on behavioral analysis of the APP container at runtime. During a learning phase, an access pattern is learned. The access pattern is a pattern of filesystem actions such as read, write, and open. In yet another embodiment, both static analysis and runtime learning may be utilized to create the security profile for an APP container, for example by including permissible filesystem actions determined based on both container image analysis and runtime learning of access patterns in the security profile.
In an embodiment, the execution of the APP container is monitored to enforce the security profile. The enforcement includes detection of any breach of the security profile based on a security policy, and may further include performing one or more mitigation actions. The various embodiments will be discussed in greater detail below.
Also connected to the network 320 is one or more image registries 330 (collectively referred to hereinafter as image registries 330 and individually as an image registry 330, merely for simplicity purposes). Each image registry 330 stores container images (not shown) that can be imported and executed on the host device 310. An example container image is shown in
An image registry 330 may be, but is not limited to, Docker Hub, Google Container Registry, Amazon EC2 Container Registry, Artifactory, and the like. The image registry 330 is a data repository that allows programming and testing of container images. An image registry 330 typically provides a centralized resource for discovery, distribution, management, and collaboration of base images. An image registry 330 may be a cloud-based registry service or may be on-premises. In certain configurations, container images can be locally stored at the host device 310, e.g., in a registry 313.
According to the disclosed embodiments, the host device 310 is configured to host and execute a detector container 315. The detector container 315 is a software container designed to profile container images stored in the registries 330 and to enforce a secured execution of a respective APP container based on security profiles. For example, a registry 313 includes a container image 301-C, where the runtime instance of this image is an APP container 311-C.
In an embodiment, the host device 310 (and the detector container 315) are configured to interface with a continuous integration (CI) system (not shown). Typically, a CI system allows for building, testing, and uploading of container images to the image registries 330. Examples for such a CI system include Jenkins®, Appveyor®, TeamCity, Bamboo, and the like. In an example embodiment, the interface between the host device 310 and the system may be realized as an API or a plugin. The host device 310 may also be communicatively connected to a database 340 storing generated security profiles, polices, and data utilized to profile the container images.
In an optional deployment, the host device 310 is communicatively connected to one or more intelligence systems 360 through the network 320. The intelligence systems 360 may include common vulnerabilities and exposures (CVE®) databases, reputation services, security systems (providing feeds on discovered threats), and so on. The information provided by the intelligence systems 360 is utilized to detect certain vulnerabilities, to profile the container images, or both.
The host device 310 may be communicatively connected to one or more external systems 370 through the network 320. Examples for such external systems 370 may include, but are not limited to, an active directory of an organization to retrieve user permissions, access control systems (e.g., Docker Swarm, and Kubernetes management plane), SIEM systems to report on detected vulnerabilities, audit and compliance systems, and the like.
According to the disclosed embodiments, the detector container 315 is configured to receive an event indicating that a container image in one of the image registries 330 has been changed or added. The event includes at least a source of the image (e.g., a registry's network address or a check-in system) and an identifier of the container image to be checked. In some embodiments, the event may be generated by the host device 310 when a new base image is uploaded to the host or when an image locally stored in the host device 310 is modified. As discussed above, the container image includes a container layer (e.g., the layer 210,
In an embodiment, upon receiving an event, the respective container image is downloaded to the host device 310 (e.g. a container image 301-C) and a security profile is generated for the container image. A security profile is generated through static analysis of the various layers, that is, without execution of the container image 301-C. The profiling process will be discussed with reference to the container image 301-C. In an optional embodiment, the container image 301-C is reformatted into a data structure that can be processed. For example, the container image 301-C may be reformatted to be, but is not limited to, a file having a standard format, a TAR (Tape ARchive) file, and the like.
In an embodiment, the detector container 315 is configured to profile filesystem actions permissible by the container image 301-C. Such permissible filesystem actions may also be determined based on the context of the application executed the APP container. Each filesystem action defines which filesystem resources can be accessed by the APP container during runtime. A filesystem resource may include a file, a directory, a sub directory, a memory page, a cache section, a folder, a volume a library, a secret (e.g., a secret key, a token, a certificate, etc.), and so on.
In an embodiment, such resources and, thus, permissible filesystem actions, are determined based on an analysis of processes to be executed by the APP container (311-C) of the respective container image 301-C. For example, if a process “myCode” includes an instruction to write to a directory “myFiles”, the security profile of the container image 301-C would designate “write to myFiles” as a permissible filesystem action.
In an embodiment, the permissible filesystem actions may be determined based on types of programs accessing or accessed by known applications matching the application of the APP container 311-C. Example programs that may access or be accessed by an application of the APP container 311-C may include, but are not limited to, MongoDB, Apache, MySQL, CMDLine, and the like. Each program may have one or more known folders, one or more files, or both, that are to be used for that program. As a non-limiting example, the program MongoDB may be configured to write only database files to a predetermined folder.
To this end, the detector container 315 may be configured to analyze the container image 301-C to identify programs written in any scripting language (e.g., Python, Ruby, JavaScript, etc.) or programming language (e.g., C, C+, Java, etc.). For each identified program (or a piece of code), the detector container 315 is configured to identify filesystem actions used by the identified programs. As non-limiting examples, the permissible filesystem actions for a program may include writing to one or more specific folders, writing only certain types of files, accessing certain volumes, filesystem actions used with respect to certain volumes (e.g., the filesystem actions may include reading for a read-only volume and opening for an execute-only volume).
Alternatively or collectively, the permissible filesystem actions may be determined based on the specific filesystem resources being accessed. As a non-limiting example, if a volume is defined as read-only, the permissible filesystem actions for accessing that volume include only read actions.
In an embodiment, the security profile is determined based on analysis of heuristics for the APP container 311-C. Such heuristics may include, but are not limited to, file permissions, correlation of file types with processes requesting access, privileged folders that should only be accessible to an admin, access patterns determined based on static analysis of common filesystem resources and parameters, a combination thereof, and the like.
As an example for file permissions, a file may be read-only such that any attempt to write to the file may be considered a violation of the security profile. As an example for correlation of file types with processes, SSH keys may only be allowed to be read or written to by an admin such that attempts to read or write an SSH key by a non-admin process are considered violations of the security profile. As an example for privileged folders, a set of folders in the operating system program (e.g., “/dev”) may only be accessed by an admin such that any process attempting to read or write to a privileged folder is considered a violation of the security profile.
As non-limiting examples for determining access patterns static analysis of common filesystem resources and parameters, such access patterns may be determined based on configuration files (e.g., nginx configuration, clustering environment configuration, etc.), specific attributes in configuration files (e.g., which folders and file types are to be used for different types of processes), secrets (e.g., secret keys, tokens, certificates, etc.), journal files (e.g., databases, logs, etc.), binary files, shared libraries, and the like. The secrets may be identified by, for example, checking a magic number, extensions, content entropy, or a combination thereof. As a non-limiting example, a non-Mongo process performing a read action from a Mongo journal file may be considered a violation of the security profile.
With respect to binary files, determining the access pattern may include detecting whether a binary is written to a disk or accessed, and a type of the binary is identified. Further, it may be determined whether the binary is benign or malicious based on, but not limited to, ELF attributes (e.g., whether the binary has symbols, whether the binary is statically compiled, etc.), whether the binary is a packed binary, whether the binary opens a non-executable shared library with executive permissions, a combination thereof, and the like.
In an embodiment, prior to generating a new security profile for a container image 311, it is checked, using its identifier, if a security policy was already generated for that container image. If so, the profiling process includes updating the contents of the existing security profile.
As noted above, in an embodiment, the generation and updating of a security profile may be performed as an offline process, that is, prior to executing the respective APP container. In another embodiment, generation or updating of a security profile can be performed as an online process, that is, at runtime during a predefined learning period (e.g., 1 hour after a first launch of the container). During the learning period, the detector container 315 is configured to monitor the operation of the APP container 311-C to learn access patterns for the APP container 311-C.
In an embodiment, each learned access pattern defines parameters of filesystem actions performed by the APP container 311-C during the learning phase. To this end, an access pattern may include, but is not limited to, specific filesystem resources accessed (e.g., a particular folder), types of files accessed (e.g., logs, executables, archives, etc.), an access rate (e.g., a read rate, a write rate, etc.), and the like.
In an embodiment, the detector container 315 is configured to enforce the security profiles based on a security policy. The security policy may define the mitigation action to be performed upon detection of a breach, the severity of each breach, whether or not a security profile should be completed in order to enforce or launch a container, a combination thereof, and the like. A security policy may be defined individually for each container image or for a group of container images.
In an embodiment, enforcement of a security policy generated for a container is executed in the host 310. For example, execution of the APP container 311-C from the container image 301-C. To this end, the detector container 315 is configured to monitor events (or system calls) indicative of instantiation, running, or both, of a new APP container (e.g., the container 311-C). The execution of an APP container 311-C is monitored at least by access attempts.
Specifically, any filesystem action that is attempted to be performed during the runtime of the APP container 311-C is captured and compared against the permissible filesystem actions as defined in the security profile. For example, an attempt to access a directory not defined as a permissible action would be considered as a violation of the security profile. As another example, an attempt to write to a volume indicated as read-only in the security profile may be determined to be a violation of the security profile.
Upon detecting a violation of the security profile, an enforcement (or mitigation) action may be performed. In an embodiment, the enforcement action to be taken is defined in the security profile. An enforcement action may include generating an alert, halting the operation of the APP container, halting or disabling the execution of a process, quarantining the APP container, preventing a filesystem action (i.e., prevent a process from reading, writing, or executing one or more files in one or more folders) and so on.
The enforcement actions may be defined with respect to different parameters, fields, or both, in the security profile. For example, any violation of a first permissible filesystem action would be reported, but a violation of a second permissible filesystem action would halt the APP container's execution. A security policy may be defined by a user (e.g., a system administrator) based on the application context of an APP container, the deployment environment, and so on.
In an embodiment, execution of an APP container (e.g., the APP container 311-C) may be performed in a quarantined environment, thereby protecting the host device 310. This embodiment is further discussed in the U.S. patent application Ser. No. 15/278,700, assigned to the common assignee, the contents of which are hereby incorporated by reference.
It should be appreciated that the host device requires an underlying hardware layer to execute the OS, VMs, and software (APP) containers. An example block diagram of a hardware layer 400 is shown in
The processing circuitry 410 may be realized by one or more hardware logic components and circuits. For example, and without limitation, illustrative types of hardware logic components that can be used include Field Programmable Gate Arrays (FPGAs), Application-specific Integrated Circuits (ASICs), System-on-a-chip systems (SOCs), Complex Programmable Logic Devices (CPLDs), general-purpose microprocessors, microcontrollers, digital signal processors (DSPs), and the like, or any other hardware logic components that can perform calculations or other manipulations of information. The memory may be volatile, non-volatile, or a combination thereof. The storage may be magnetic storage, optical storage, and the like.
In one configuration, computer readable instructions to implement one or more of the embodiments disclosed herein may be stored in the storage. The storage may also store other computer readable instructions to implement an operating system, an application program, and the like. Computer readable instructions may be loaded in the memory for execution by the processing circuitry 410.
In another embodiment, the storage 420, the memory 415, or both, are configured to store software. Software shall be construed broadly to mean any type of instructions, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise. Instructions may include code (e.g., in source code format, binary code format, executable code format, or any other suitable format of code). The instructions, when executed by the processing system 410, cause the processing system 510 to perform the various functions described herein with respect to at least profiling container images and enforcing secured execution of their respective APP containers based on the profiles.
The network interface 430 allows communication with other external systems or host devices through a network (e.g., the network 320). The network interface 430 may include a wired connection or a wireless connection. The network interface 430 may transmit communication media, receive communication media, or both. The computer bus 440 may be, for example, a PCIe bus.
At S510, an event indicating that a container image should be scanned is received. Such an event can be received from a continuous integration system, an image registry, and the like. The event may designate a specific container image or a group of images (each of which identified by their unique identifier) and the source of the image(s) to be scanned. For sake of simplicity of the discussion, the example flowchart 500 is discussed with respect to receiving a single event of single container image and enforcing a single corresponding APP container. It should be noted that additional events may be received without departing from the scope of the disclosure. Further, multiple container images and APP containers can be processed in parallel.
At S520, the container image (e.g., the container image 301-C,
At optional S530, the contents of the container image are extracted. Specifically, the contents of each layer in the container image may be extracted. In an embodiment, the extraction includes reformatting the container image into a data structure that can be processed.
At S540, the contents of the container image are analyzed to generate a new security profile. In some implementations, S540 may include updating an existing security profile. As discussed above, the security profile is generated to include at least permissible filesystem actions. Static profiling of a container image is discussed above and is further demonstrated in
At S550, the new or updated security profile is saved in a database, indexed based on the respective container image identifier. The profiling of a container image is typically performed prior to runtime. As noted above, a generated security profile can also be updated at runtime during a predefined learning period, for example, by re-analyzing the container contents, or by monitoring port usage during a learning phase as described herein below with respect to
At S560, the method transitions to an enforcement mode, upon receiving an event indicative of instantiation, running, or both, of a new APP container. An APP container (e.g., the APP container 311-C.
At S570, it is checked if the retrieved security profile has been violated and, if so, execution continues with S580. where an enforcement action is performed. Otherwise, execution terminates.
As discussed above, the enforcement action may be determined based on a security policy, the type of the detected violation, or both. The endorsement action may include, for example, generating an alert (or security event), halting the operation of the APP container, quarantining the APP container or the infected file, and so on. The alert may include an APP container identifier, a name of the infected process, information of the detected violation, and so on. The enforcement of the security policy is performed at runtime.
At S620, each identified program is inspected. The may include determining an application to be executed by the container, a configuration for the application, one or more environmental variables, or a combination thereof.
At S630, permissible filesystem actions are identified. The permissible filesystem actions may be identified based on filesystem actions used by the identified programs. To this end, in an embodiment, S630 may include determining permissible filesystem actions with respect to accessing different filesystem resources. The permissible filesystem actions may be further defined with respect to programs that are permitted to perform each filesystem action. For example, a cluster admin user service may be permitted to read and write SSH keys while other programs are not.
In an embodiment, S630 may further include identifying permissible filesystem actions based on heuristics as described further herein above with respect to
At S640, the permissible filesystem actions are saved in the security profile.
At S710, an event indicating that an APP container should be profiled is received. Such an event can be received from a continuous integration system, an image registry, and the like. The event may designate each APP container of a specific container image or group of container images.
At S720, during a learning phase, execution of the APP container is monitored. In an embodiment, S720 includes capturing filesystem actions attempted by the APP container. The learning phase occurs during a startup period after initialization of the APP container, and may be a predetermined period of time (e.g., 10 minutes).
At S730, based on the learning phase monitoring, an access pattern is identified. The access pattern may include, but is not limited to, specific folders accessed (e.g., “/etc”), types of tiles accessed (e.g., logs, executables, archives, etc.), read/write rate, a combination thereof, and the like.
At S740, a new or updated security profile is saved in a database, indexed based on the respective container image identifier. In the embodiment described with respect to
At S750, the method transitions to an enforcement mode upon completion of the learning mode. In an embodiment, S750 includes retrieving the respective security profile; capturing filesystem actions attempted by the APP container; and analyzing the captured filesystem actions to detect violations of any parameter sets in the retrieved security profile. The analysis may include comparing any comparing the captured filesystem actions with the permissible filesystem actions.
At S760, it is checked if the retrieved security profile has been violated and, if so, execution continues with S770. where an enforcement action is performed. Otherwise, execution terminates.
As discussed above, the enforcement action may be determined based on a security policy, the type of the detected violation, or both. The endorsement action may include, for example, generating an alert (or security event), halting the operation of the APP container, quarantining the APP container or the infected file, and so on. The alert may include an APP container identifier, a name of the infected process, information of the detected violation, and so on. The enforcement of the security policy is performed at runtime.
It should be noted that
It should be noted that various embodiments have been discussed herein with a reference to software containers. A software container provides an executable environment with a complete filesystem. A software container may include a micro-service, a Docker container, a light virtual machine, a serverless process, and the like.
The various embodiments disclosed herein can be implemented as hardware, firmware, software, or any combination thereof. Moreover, the software is preferably implemented as an application program tangibly embodied on a program storage unit or computer readable medium consisting of parts, or of certain devices and/or a combination of devices. The application program may be uploaded to, and executed by, a machine comprising any suitable architecture. Preferably, the machine is implemented on a computer platform having hardware such as one or more central processing units (“CPUs”), a memory, and input/output interfaces. The computer platform may also include an operating system and microinstruction code. The various processes and functions described herein may be either part of the microinstruction code or part of the application program, or any combination thereof, which may be executed by a CPU, whether or not such a computer or processor is explicitly shown. In addition, various other peripheral units may be connected to the computer platform such as an additional data storage unit and a printing unit. Furthermore, a non-transitory computer readable medium is any computer readable medium except for a transitory propagating signal.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the principles of the disclosed embodiment and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the disclosed embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future, i.e., any elements developed that perform the same function, regardless of structure.
It should be understood that any reference to an element herein using a designation such as “first,” “second,” and so forth does not generally limit the quantity or order of those elements. Rather, these designations are generally used herein as a convenient method of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements may be employed there or that the first element must precede the second element in some manner. Also, unless stated otherwise, a set of elements comprises one or more elements.
As used herein, the phrase “at least one of” followed by a listing of items means that any of the listed items can be utilized individually, or any combination of two or more of the listed items can be utilized. For example, if a system is described as including “at least one of A, B, and C,” the system can include A alone; B alone; C alone; 2A; 2B; 2C; 3A; A and B in combination; B and C in combination; A and C in combination; A, B, and C in combination; 2A and C in combination; A, 3B, and 2C in combination; and the like.
This application is a continuation of U.S. patent application Ser. No. 15/865,763 filed on Jan. 9, 2018, now allowed. The Ser. No. 15/865,763 application is a continuation-in-part of U.S. patent application Ser. No. 15/397,230 filed on Jan. 3, 2017, now allowed, which claims the benefit of U.S. Provisional Patent Application No. 62/274,420 filed on Jan. 4, 2016, and 62/274,798 filed on Jan. 5, 2016. The Ser. No. 15/397,230 application is also a continuation-in-part (CIP) of: a) U.S. patent application Ser. No. 15/278,700 filed on Sep. 28, 2016, now pending, which claims the benefit of U.S. Provisional Patent Application No. 62/235,644 filed on Oct. 1, 2015, and 62/235,641 filed on Oct. 1, 2015; and b) U.S. patent application Ser. No. 15/292,915 filed on Oct. 13, 2016, now U.S. Pat. No. 10,223,534, which claims the benefit of U.S. Provisional Patent Application No. 62/241,812 filed on Oct. 15, 2015. The contents of the above-referenced applications are hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
6490620 | Ditmer et al. | Dec 2002 | B1 |
6502102 | Haswell et al. | Dec 2002 | B1 |
6523027 | Underwood | Feb 2003 | B1 |
6704873 | Underwood | Mar 2004 | B1 |
6732162 | Wood et al. | May 2004 | B1 |
7100195 | Underwood | Aug 2006 | B1 |
7103740 | Colgrove et al. | Sep 2006 | B1 |
7379978 | Anderson | May 2008 | B2 |
7577848 | Schwartz et al. | Aug 2009 | B2 |
7596227 | Illowsky et al. | Sep 2009 | B2 |
7640235 | Shulman et al. | Dec 2009 | B2 |
7698741 | Marinescu et al. | Apr 2010 | B2 |
7743420 | Shulman et al. | Jun 2010 | B2 |
7752662 | Shulman et al. | Jul 2010 | B2 |
7752669 | Palliyil et al. | Jul 2010 | B2 |
7779468 | Magdych et al. | Aug 2010 | B1 |
7861303 | Kouznetsov et al. | Dec 2010 | B2 |
7882542 | Neystadt et al. | Feb 2011 | B2 |
8024804 | Shulman et al. | Sep 2011 | B2 |
8051484 | Shulman et al. | Nov 2011 | B2 |
8056141 | Shulman et al. | Nov 2011 | B2 |
8108933 | Mahaffey | Jan 2012 | B2 |
8135948 | Shulman et al. | Mar 2012 | B2 |
8181246 | Shulman et al. | May 2012 | B2 |
8302192 | Cnudde et al. | Oct 2012 | B1 |
8316237 | Felsher et al. | Nov 2012 | B1 |
8499150 | Nachenberg | Jul 2013 | B1 |
8510571 | Chang et al. | Aug 2013 | B1 |
8621613 | McClintock et al. | Dec 2013 | B1 |
8639625 | Ginter et al. | Jan 2014 | B1 |
8677472 | Dotan et al. | Mar 2014 | B1 |
8756683 | Manion et al. | Jun 2014 | B2 |
8806625 | Berger | Aug 2014 | B1 |
8966629 | Sallam | Feb 2015 | B2 |
9003141 | Nielsen | Apr 2015 | B2 |
9098333 | Obrecht et al. | Aug 2015 | B1 |
9203862 | Kashyap et al. | Dec 2015 | B1 |
9223966 | Satish et al. | Dec 2015 | B1 |
9256467 | Singh et al. | Feb 2016 | B1 |
9355248 | Wiest et al. | May 2016 | B1 |
9401922 | Walters | Jul 2016 | B1 |
9594590 | Hsu | Mar 2017 | B2 |
9904781 | Martini et al. | Feb 2018 | B2 |
9928379 | Hoffer | Mar 2018 | B1 |
10223534 | Stopel et al. | Mar 2019 | B2 |
10333967 | Litva et al. | Jun 2019 | B2 |
20010007131 | Galasso et al. | Jul 2001 | A1 |
20030014629 | Zuccherato | Jan 2003 | A1 |
20030079145 | Kouznetsov et al. | Apr 2003 | A1 |
20030120593 | Bansal | Jun 2003 | A1 |
20030229801 | Kouznetsov et al. | Dec 2003 | A1 |
20030233566 | Kouznetsov et al. | Dec 2003 | A1 |
20030233574 | Kouznetsov et al. | Dec 2003 | A1 |
20040133793 | Ginter et al. | Jul 2004 | A1 |
20050120054 | Shulman et al. | Jun 2005 | A1 |
20050177715 | Somin et al. | Aug 2005 | A1 |
20060075494 | Bertman et al. | Apr 2006 | A1 |
20060230451 | Kramer | Oct 2006 | A1 |
20060277606 | Yunus et al. | Dec 2006 | A1 |
20060282664 | Zhao | Dec 2006 | A1 |
20060288420 | Mantripragada | Dec 2006 | A1 |
20070112714 | Fairweather | May 2007 | A1 |
20070130621 | Marinescu et al. | Jun 2007 | A1 |
20070136282 | Takashima | Jun 2007 | A1 |
20070174630 | Shannon et al. | Jul 2007 | A1 |
20070240218 | Tuvell et al. | Oct 2007 | A1 |
20070240220 | Tuvell et al. | Oct 2007 | A1 |
20070240221 | Tuvell et al. | Oct 2007 | A1 |
20070240222 | Tuvell et al. | Oct 2007 | A1 |
20080086773 | Tuvell et al. | Apr 2008 | A1 |
20080134177 | Fitzgerald et al. | Jun 2008 | A1 |
20080168135 | Redlich et al. | Jul 2008 | A1 |
20080177994 | Mayer | Jul 2008 | A1 |
20080196104 | Tuvell et al. | Aug 2008 | A1 |
20080256636 | Gassoway | Oct 2008 | A1 |
20090144823 | Lamastra et al. | Jun 2009 | A1 |
20090158432 | Zheng et al. | Jun 2009 | A1 |
20090217260 | Gebhart et al. | Aug 2009 | A1 |
20090319796 | Kim et al. | Dec 2009 | A1 |
20100011029 | Niemela | Jan 2010 | A1 |
20110116637 | Schiefelbein | May 2011 | A1 |
20110125894 | Anderson | May 2011 | A1 |
20110179484 | Tuvell et al. | Jul 2011 | A1 |
20110258701 | Cruz et al. | Oct 2011 | A1 |
20110314542 | Viswanathan et al. | Dec 2011 | A1 |
20110314548 | Yoo | Dec 2011 | A1 |
20110321139 | Jayaraman et al. | Dec 2011 | A1 |
20120008529 | Averbuch et al. | Jan 2012 | A1 |
20120023584 | Yoo | Jan 2012 | A1 |
20120036572 | Yoo | Feb 2012 | A1 |
20120042375 | Yoo | Feb 2012 | A1 |
20120117203 | Taylor et al. | May 2012 | A1 |
20120222123 | Williams et al. | Aug 2012 | A1 |
20130073388 | Heath | Mar 2013 | A1 |
20140059226 | Messerli et al. | Feb 2014 | A1 |
20140173761 | Hong et al. | Jun 2014 | A1 |
20140181894 | Bokern et al. | Jun 2014 | A1 |
20140237550 | Anderson | Aug 2014 | A1 |
20140283071 | Spikes | Sep 2014 | A1 |
20140337234 | Tang et al. | Nov 2014 | A1 |
20150156183 | Beyer et al. | Jun 2015 | A1 |
20150178497 | Lukacs et al. | Jun 2015 | A1 |
20150220735 | Paithane et al. | Aug 2015 | A1 |
20150271139 | Lukacs et al. | Sep 2015 | A1 |
20150332043 | Russello | Nov 2015 | A1 |
20150372980 | Eyada | Dec 2015 | A1 |
20150379287 | Mathur et al. | Dec 2015 | A1 |
20160323315 | Hathaway et al. | Nov 2016 | A1 |
20170004302 | Derbeko et al. | Jan 2017 | A1 |
20170063557 | Chalmandrier-Pema | Mar 2017 | A1 |
20170068676 | Jayachandran | Mar 2017 | A1 |
20170177877 | Suarez et al. | Jun 2017 | A1 |
20170244748 | Krause et al. | Aug 2017 | A1 |
Entry |
---|
Mattetti, Massimiliano et al. Securing the infrastructure and the workloads of linux containers. 2015 IEEE Conference on Communications and Network Security (CNS). https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7346869 (Year: 2015). |
Canali, Claudia et al. Distributed Architectures for High Performance and Privacy-Aware Content Generation and Delivery. 2006 Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4041326 (Year: 2006). |
Balazsi, et al., “Software System for Broadcasting and Monitoring Traffic Information”, 2014 IEEE 12th International Symposium on Intelligent Systems and Informatics (SISY), 2014, pp. 39-42, Subotica, Serbia. |
Jing, et al., “A Context-aware Disaster Response System Using Mobile Software Technologies and Collaborative Filtering Approach”, 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014, pp. 516-522, China. |
Azkia, et al., “Reconciling IHE-ATNA Profile with a posteriori Contextual Access and Usage Control Policy in Healthcare Environment”, 2010 Sixth International Conference on Information Assurance and Security, 2010 IEEE, pp. 197-203, Cesson, Sevigne, France. |
Cooper, et. al., “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, May 2008, pp. 151. |
Cziva, et al., “Container-based Network Function Virtualization for Software-Defined Networks,” 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 415-420, Scotland. |
Dhakchianandan, et al., “Memory Efficacious Pattern Matching Intrusion Detection System”, 2013 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 652-656, Anna University, Chennai, India. |
Guenane, et al, “Autonomous Architecture for Managing Firewalling Cloud-Based Service,” 2014 International Conference and Workshop on the Network of the Future (NOF), Paris, France, pp. 1-5. |
Housley, et. al., “Internet X 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, Apr. 2002, pp. 259. |
Kovatsch, et. al., “A RESTful Runtime Container for Scriptable Internet of Things Applications”, 3rd IEEE International Conference on the Internet of Things, Oct. 2012. |
Linn, et al., “Protecting Against Unexpected System Calls”, Department of Computer Science, University of Arizona, Tucson, AZ, 2005, url: https://www.usenix.org/legacy/events/sec05/tech/linn.html, pp. 239-254. |
Mattetti, et. al., “Securing the Infrastructure and the Workloads of Linux Containers”, IEEE Conference on Communications and Network Security (CNS), 2015. |
Pan, et. al., Robust Container Code Recognition System, Fifth World Congress on Intelligent Control and Automation, 2004. |
Rehak, et al., “Adaptive Multiagent System for Network Traffic Monitoring,” IEEE Intelligent Systems, vol. 24, Issue: 3, 2009, Czechia, pp. 17-25. |
Schneier, Bruce., “Economics of Information Security and Privacy III”, 2013, pp. 73-109. |
Shouman, et al., “Surviving Cyber Warfare With a Hybrid Multiagent-based Intrusion Prevention System,” IEEE Potentials, vol. 29, Issue: 1, 2010, pp. 32-40. |
Skillen, et al., “Mobiflage: Deniable Storage Encryption for Mobile Devices,” IEEE Transaction on Dependable and Secure Computing, vol. 11, No. 3, May-Jun. 2014, 2013 IEEE, pp. 224-237, Canada. |
Song, et al., “A Control Theoretical Approach for Flow Control to Mitigate Bandwidth Attacks,” 2006 IEEE Information Assurance Workshop, West Point, NY, pp. 348-360. |
Van Niekerk, et al., “Cloud-Based Security Mechanisms for Critical Information Infrastructure Protection,” 2013 International Conference on Adaptive Science and Technology, South Africa, pp. 1-4. |
Wang, et al., “Transport-Aware IP Routers: A Built-in Protection Mechanism to Counter DDoS Attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 14, Issue: 9, pp. 873-884, Sep. 2003. |
Zhauniarovich, et al., “MOSES: Supporting and Enforcing Security Profiles on Smartphones,” IEEE Transactions on Dependable and Secure Computing, vol. 11, Issue: 3, pp. 211-223, 2014. |
Number | Date | Country | |
---|---|---|---|
20200193015 A1 | Jun 2020 | US |
Number | Date | Country | |
---|---|---|---|
62274420 | Jan 2016 | US | |
62274798 | Jan 2016 | US | |
62235644 | Oct 2015 | US | |
62235641 | Oct 2015 | US | |
62241812 | Oct 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15865763 | Jan 2018 | US |
Child | 16796288 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15397230 | Jan 2017 | US |
Child | 15865763 | US | |
Parent | 15278700 | Sep 2016 | US |
Child | 15397230 | US | |
Parent | 15292915 | Oct 2016 | US |
Child | 15278700 | US |