Fine-grained sandbox policy mining method for Linux container
A container and sandbox technology applied in the computer field to achieve the effect of reducing the attack surface
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and implementation examples. It should be understood that the described implementation examples are only used to illustrate and explain the present invention, and should not limit the scope of the present invention.
[0027] The invention proposes a fine-grained sandbox strategy mining method for Linux containers. Specifically, the sandbox policy mining method traverses the behavior of the target container through automated testing, monitors and records the system call behavior of the target container, extracts the system call behavior characteristics of the target container, and generates a fine-grained sandbox policy that restricts the system call access of the target container . The fine-grained sandbox policy restricts the system call types and param...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com