Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Analyzing Docker Vulnerabilities through Static and Dynamic Methods and Enhancing IoT Security with AWS IoT Core, CloudWatch, and GuardDuty

Version 1 : Received: 20 June 2024 / Approved: 21 June 2024 / Online: 24 June 2024 (05:28:55 CEST)

How to cite: Ajith, V.; Cyriac, T.; Chavda, C.; Kiyani, A. T.; Chennareddy, V.; Ali, K. Analyzing Docker Vulnerabilities through Static and Dynamic Methods and Enhancing IoT Security with AWS IoT Core, CloudWatch, and GuardDuty. Preprints 2024, 2024061507. https://doi.org/10.20944/preprints202406.1507.v1 Ajith, V.; Cyriac, T.; Chavda, C.; Kiyani, A. T.; Chennareddy, V.; Ali, K. Analyzing Docker Vulnerabilities through Static and Dynamic Methods and Enhancing IoT Security with AWS IoT Core, CloudWatch, and GuardDuty. Preprints 2024, 2024061507. https://doi.org/10.20944/preprints202406.1507.v1

Abstract

During our digital transition, Docker containers have become essential for adaptable application deployment, although posing inherent security threats. This study utilizes Trivy for static analysis and Falco for dynamic analysis to identify and address vulnerabilities in Docker environments before deployment and in real-time. The IoT sector is now dealing with security issues that are made more severe by extensive connectivity and the prevalence of WiFi. This research promotes the use of AWS cloud security technologies such as IoT Core, CloudWatch, and GuardDuty to protect IoT devices from threats, with the goal of maintaining user privacy and ensuring safety in our interconnected digital world. This comprehensive strategy aims to enhance security measures in both Docker and IoT sectors, strengthening the security framework in our interconnected world.

Keywords

IoT; Docker; Security; AWS; Trivy; Falco; AWS IoT Core; AWS CloudWatch; AWS GuardDuty

Subject

Computer Science and Mathematics, Analysis

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.