Problems of the detection systems usage and preventing intrusion into container environments

Oleksii Misnik


All the means of safety of the container environments are analyzed. There are generalized practical problems of using intrusion detection and prevention software, isolated application launch. Among them is emphasised functionality of this software. Emphasis is placed on the difficulties of implementing the privileged function. These difficulties lead to a decrease in the efficiency of its usage and, as a consequence, to the safety of container environments.

Повний текст:



T.I. Zorina, "Detection and prevention of attacks in computer networks" VISNIK OF THE VOLODYMYR DAHL EAST UKRAINIAN NATIONAL UNIVERSITY, Volodymyr Dahl East Ukrainian National University, No. 83, 2013, pp. 48-52

Tereykovsky I., Korchenko А., Parashchuk T., Pedchenko Y., "Open intrusion detection systems analysis", Ukrainian Scientific Journal of Information Security,vol. 24, No. 3, 2018, pp. 201-216

M.A. Kachanov, D.N. Kolegov, "Security analysis of the information flows by memory in the computer systems with functional and parametric associated entities", Mathematical Foundations of Computer Security, Tomsk State University, No. 2, 2008, pp. 76-80.

A.S. Vishnyakov, A.E. Makarov, “Implementation of an external threat detection system in cloud computing”, Scientific journal, 2019

Bondyakov Aleksey Sergeevich, "The basic modes of the intrusion prevention system (ids/ips suricata) for the computing cluster", International Scientific Journal "Modern Information Technology and IT-education", vol. 13, No. 3, 2017, p. 31-37

O.I. Mіsnіk, M.V. Antonіshin, and V.V. Turcan, “Quality analysis web application vulnerability scanners”, Modeling and Information Technologies, No. 83, 2018, pp. 77-86.

OWASP Docker-Security. [Online]. Available:


  • Поки немає зовнішніх посилань.