Abstract
Container-orchestration software such as Kubernetes make it easy to deploy and manage modern cloud applications based on microservices. Yet, its network abstractions pave the way for "unexpected attacks"if we approach cloud network security with the same mental model of traditional network security.
| Original language | English |
|---|---|
| Article number | 9497237 |
| Pages (from-to) | 46-56 |
| Number of pages | 11 |
| Journal | IEEE Security & Privacy |
| Volume | 19 |
| Issue number | 5 |
| Early online date | 27 Jul 2021 |
| DOIs | |
| Publication status | Published - 1 Sept 2021 |
Bibliographical note
Funding Information:We thank the reviewers and IEEE Security & Privacy’s Editor in Chief Sean Peisert for their comments that greatly helped to improve this article. Any remaining error is our fault. This work has received funding by the European Union under the H2020 grant 952647 (AssureMOSS).
Publisher Copyright:
© 2003-2012 IEEE.
Funding
We thank the reviewers and IEEE Security & Privacy’s Editor in Chief Sean Peisert for their comments that greatly helped to improve this article. Any remaining error is our fault. This work has received funding by the European Union under the H2020 grant 952647 (AssureMOSS).
| Funders | Funder number |
|---|---|
| Horizon 2020 Framework Programme | 952647 |
| European Commission |
Fingerprint
Dive into the research topics of 'Understanding the Security Implications of Kubernetes Networking'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver