ACE-WARP: A Cost-Effective Approach to Proactive and Non-disruptive Incident Response in Kubernetes Clusters

S Bagheri, H Kermabon-Bobinnec… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
A large-scale cluster of containers managed with an orchestrator like Kubernetes are behind
many cloud-native applications today. However, the weaker isolation provided by containers …

Prospec: Proactive security policy enforcement for containers

H Kermabon-Bobinnec, M Gholipourchoubeh… - Proceedings of the …, 2022 - dl.acm.org
By providing lightweight and portable support for cloud native applications, container
environments have gained significant momentum lately. A container orchestrator such as …

Kunerva: Automated network policy discovery framework for containers

S Lee, J Nam - IEEE Access, 2023 - ieeexplore.ieee.org
Containerization has gained significant popularity in cloud-native applications, offering
lightweight and portable capabilities, with container orchestration platforms such as …

LeaPS: Learning-based proactive security auditing for clouds

S Majumdar, Y Jarraya, M Oqaily… - … –ESORICS 2017: 22nd …, 2017 - Springer
Cloud security auditing assures the transparency and accountability of a cloud provider to its
tenants. However, the high operational complexity implied by the multi-tenancy and self …

User-level runtime security auditing for the cloud

S Majumdar, T Madi, Y Wang, Y Jarraya… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient,
and on-demand accesses to a shared pool of configurable computing resources. However …

ProSAS: Proactive Security Auditing System for Clouds

S Majumdar, GS Chawla… - … on Dependable and …, 2021 - ieeexplore.ieee.org
The multi-tenancy in a cloud along with its dynamic and self-service nature could cause
severe security concerns, such as isolation breaches among cloud tenants. To mitigate such …

ISOTOP: Auditing virtual networks isolation across cloud layers in OpenStack

T Madi, Y Jarraya, A Alimohammadifar… - ACM Transactions on …, 2018 - dl.acm.org
Multi-tenancy in the cloud is a double-edged sword. While it enables cost-effective resource
sharing, it increases security risks for the hosted applications. Indeed, multiplexing virtual …

Tenantguard: Scalable runtime verification of cloud-wide vm-level network isolation

Y Wang - 2017 - spectrum.library.concordia.ca
The multi-tenancy of a cloud usually leads to security concerns over network isolation
around each cloud tenant's virtual resources. However, verifying network isolation in cloud …