Leadership Hijacking in Docker Swarm and Its Consequences

نویسندگان

چکیده

With the advent of microservice-based software architectures, an increasing number modern cloud environments and enterprises use operating system level virtualization, which is often referred to as container infrastructures. Docker Swarm one most popular orchestration infrastructures, providing high availability fault tolerance. Occasionally, discovered escape vulnerabilities allow adversaries execute code on host operate within infrastructure. We show that currently not secured against misbehaving manager nodes. This allows a impact, probability privilege escalation attack, we refer leadership hijacking, possibility neglected by current security literature. Cloud lateral movement defense evasion payloads adversary leverage functionality control each every in underlying cluster. demonstrate end-to-end with access application running cluster achieves full To reduce successful impact infrastructures must trust participating nodes and, particular, incorporate immune leader election algorithms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Consequences of Ethical Leadership and Its Role in Reducing Organizational Deviation

Background: Ethics is one of the important issues which is considered seriously in all areas, including in the field of management and organization. The purpose of this paper is to examine the consequences of ethical leadership and ethical climate and its role in decreasing organizational deviance among which we will refer to the mediator of emotional commitment and turnover intention will be m...

متن کامل

Understanding IP Prefix Hijacking and its Detection

Since IP Prefix Hijacking is a major threat for every Autonomous System in the Internet, this paper tries to give an understanding of IP prefix hijacking and some of their detection methods. This may rise attention and awareness for that topic among the readers. If a malicious attacker would hijack an IP and use it for committing serious crimes, the original owner of the IP address would eventu...

متن کامل

Authentic leadership, social support and their role in workplace bullying and its mental health consequences

The aim of this study was to show how authentic leadership is related to social support and exposure to workplace bullying and how these variables are related to mental health. For our sample of 820 office workers employed in different Polish organizations and sectors, social support from supervisors moderated the relationship between authentic leadership and workplace bullying. Social support ...

متن کامل

The Basic Theorem and its Consequences

Let T be a compact Hausdorff topological space and let M denote an n–dimensional subspace of the space C(T ), the space of real–valued continuous functions on T and let the space be equipped with the uniform norm. Zukhovitskii [7] attributes the Basic Theorem to E.Ya.Remez and gives a proof by duality. He also gives a proof due to Shnirel’man, which uses Helly’s Theorem, now the paper obtains a...

متن کامل

Covid-19 and its Psychological Consequences

In December 2019, a new type of coronavirus was identified in Wuhan, China, and spread rapidly throughout China. The spread of Covid-19 was unique due to its rapid transmission, which created an emergency situation in global health in less than a few months around the world. It not only causes general health concerns, but also causes a number of psychological illnesses, including anxiety, fear,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Entropy

سال: 2021

ISSN: ['1099-4300']

DOI: https://doi.org/10.3390/e23070914