A security detection method and system for kubernetes cloud-native applications
A security detection and native application technology, applied in the field of cloud computing, can solve the problems of lagging Kubernetes security research and lack of Kubernetes static security detection solutions
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The specific implementation of the invention will be further described below in conjunction with the accompanying drawings.
[0043] Different from conventional file scanning of traditional security software, in a container image, each image contains several layers, and each layer is marked with a special identifier. Based on the identifier of the image layer, the detection of malicious containers can be performed more quickly. Effectively locate malicious applications, which is what traditional security software lacks in the cloud-native era. The Chart application contains the necessary information to create an application instance of Kubernetes. The Chart application implements the packaging of Kubernetes resources, and can be used to install or uninstall applications in the Kubernetes cluster.
[0044] Such as figure 1 , figure 2 As shown, a security detection method for Kubernetes cloud-native applications includes the following steps:
[0045] S1. Configuration...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


