Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments

The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and operated do not lend themselves well to the conventional application of methods for conducting intrusion detection and analysis in traditional physical and virtual machine networks. While...
By Alfredo Hickman
January 13, 2018

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg