Virtualization is a technique that allows multiple instances typically running different guest operating systems on top of single physical hardware. A hypervisor, a layer of software running on top of the host operating system, typically runs and manages these different guest operating systems. Rather than to run different services on different servers for reliability and security reasons, companies started to employ virtualization over their servers to run these services within a single server. This approach proves beneficial to the companies as it provides much better reliability, stronger isolation, improved security and resource utilization compared to running services on multiple servers. Although hypervisor based virtualization offers better resource utilization and stronger isolation, it also suffers from high overhead as the host operating system has to maintain different guest operating systems.
To tackle this issue, another form of virtualization known as Operating System-level virtualization has emerged. This virtualization provides light-weight, minimal and efficient virtualization, as the different instances are run on top of the same host operating system, sharing the resources of the host operating system. But due to instances sharing the same host operating system affects the isolation of the instances. In this paper, we will first establish the basic concepts of virtualization and point out the differences between the hyper-visor based virtualization and operating system-level virtualization. Next, we will discuss the container creation life-cycle which helps in forming a container threat model for the container systems, which allows to map different potential attack vectors within these systems. Finally, we will discuss a case study, which further looks at isolation provided by the containers.
Virtualization technology enables multiple instances with different guest operating systems to run on a single physical hardware platform. While hypervisor-based virtualization provides better resource utilization and stronger isolation, it suffers from high overhead due to the host operating system maintaining different guest operating systems. To address this limitation, OS-level virtualization has emerged, offering lightweight, minimal, and efficient virtualization. However, since instances share the same host operating system, inter-instance isolation is compromised. This paper establishes fundamental virtualization concepts, analyzes the differences between hypervisor virtualization and OS-level virtualization, discusses the container creation lifecycle, constructs a container threat model, and analyzes the isolation provided by containers through case studies.
Resource Utilization Efficiency: Traditional deployment of different services on separate servers improves reliability and security but is costly and results in low resource utilization
Virtualization Overhead: While hypervisor-based virtualization improves resource utilization, maintaining multiple guest operating systems introduces significant overhead
Container Security Isolation: Although OS-level virtualization addresses overhead concerns, sharing the operating system kernel may compromise security isolation between containers
Traditional Virtualization: Hypervisor virtualization incurs substantial overhead, with each virtual machine requiring a complete guest operating system
Insufficient Security Analysis: Security and isolation analysis of OS-level virtualization lacks depth
Missing Threat Models: Absence of systematic container threat models to identify potential attack vectors
Established a comparative framework for virtualization technologies: Systematically compares advantages and disadvantages of hypervisor virtualization and OS-level virtualization
Constructed a detailed container creation lifecycle model: Analyzes the complete process of Docker containers from build to execution
Proposed a comprehensive container threat model: Identifies and classifies nine major attack vectors in container systems
Provided practical vulnerability case analysis: Conducts in-depth analysis of security issues through two real vulnerabilities: CVE-2024-21626 and CVE-2022-0847
Offered container security hardening recommendations: Provides practical security best practices based on analysis results
This research aims to systematically analyze the security and isolation of OS-level virtualization (particularly Docker containers), identify potential attack vectors through threat modeling, and provide security hardening recommendations.
External Attacks: Remote access to container systems via network
Internal Attacks: Attacks initiated by attackers already present as users within containers
This paper builds upon the foundation of virtualization technology development. While virtualization concepts have existed since the 1960s, they only became mainstream technology in the 1990s.
Double-Edged Nature of OS-Level Virtualization: While providing lightweight and efficient virtualization solutions, shared operating system kernels introduce security isolation challenges
Diversity of Threat Vectors: Container systems face full-lifecycle security threats from image repositories to runtime environments
Practical Security Risks: CVE case analysis confirms the real existence of serious security threats such as container escape and privilege escalation
Continuous Security Challenges: Container security is an evolving problem requiring continuous updates to protective measures
Research Scope Constraints: Primarily focuses on Docker containers without covering other container technologies (such as FreeBSD Jails, Solaris Zones)
Threat Model Depth: While identifying major attack vectors, discussion of specific protective measures for each attack type lacks depth
Limited Experimental Cases: Analysis of only two CVE cases may be insufficient to comprehensively reflect the complexity of container security threats
Insufficient Quantitative Analysis: Lacks quantitative assessment of risk levels for different attack vectors
The paper proposes the following research directions:
AI-Driven Threat Detection: Integration of artificial intelligence technology to enhance container systems' resilience against emerging vulnerabilities
Secure Communication Protocols: Development of more secure inter-container communication protocols
Wireless Environment Optimization: Optimization of container networking for wireless environments
System-Level Innovation: Improvement of resource allocation through system-level innovation to ensure performance and security in dynamic distributed infrastructure
Important security vulnerability reports (CVE-2024-21626, CVE-2022-0847)
Related research work by the author team in security, AI, and IoT domains
Overall Assessment: This paper provides a relatively comprehensive security analysis framework for OS-level virtualization. While limited in theoretical innovation, it possesses high practical value and systematic rigor, making it suitable as introductory and reference material in the container security field.