Version 1
: Received: 20 June 2024 / Approved: 21 June 2024 / Online: 24 June 2024 (05:28:55 CEST)
How to cite:
Ajith, V.; Cyriac, T.; Chavda, C.; Kiyani, A. T.; Chennareddy, V.; Ali, K. Analyzing Docker Vulnerabilities through Static and Dynamic Methods and Enhancing IoT Security with AWS IoT Core, CloudWatch, and GuardDuty. Preprints2024, 2024061507. https://doi.org/10.20944/preprints202406.1507.v1
Ajith, V.; Cyriac, T.; Chavda, C.; Kiyani, A. T.; Chennareddy, V.; Ali, K. Analyzing Docker Vulnerabilities through Static and Dynamic Methods and Enhancing IoT Security with AWS IoT Core, CloudWatch, and GuardDuty. Preprints 2024, 2024061507. https://doi.org/10.20944/preprints202406.1507.v1
Ajith, V.; Cyriac, T.; Chavda, C.; Kiyani, A. T.; Chennareddy, V.; Ali, K. Analyzing Docker Vulnerabilities through Static and Dynamic Methods and Enhancing IoT Security with AWS IoT Core, CloudWatch, and GuardDuty. Preprints2024, 2024061507. https://doi.org/10.20944/preprints202406.1507.v1
APA Style
Ajith, V., Cyriac, T., Chavda, C., Kiyani, A. T., Chennareddy, V., & Ali, K. (2024). Analyzing Docker Vulnerabilities through Static and Dynamic Methods and Enhancing IoT Security with AWS IoT Core, CloudWatch, and GuardDuty. Preprints. https://doi.org/10.20944/preprints202406.1507.v1
Chicago/Turabian Style
Ajith, V., Vijay Chennareddy and Kamran Ali. 2024 "Analyzing Docker Vulnerabilities through Static and Dynamic Methods and Enhancing IoT Security with AWS IoT Core, CloudWatch, and GuardDuty" Preprints. https://doi.org/10.20944/preprints202406.1507.v1
Abstract
During our digital transition, Docker containers have become essential for adaptable application deployment, although posing inherent security threats. This study utilizes Trivy for static analysis and Falco for dynamic analysis to identify and address vulnerabilities in Docker environments before deployment and in real-time. The IoT sector is now dealing with security issues that are made more severe by extensive connectivity and the prevalence of WiFi. This research promotes the use of AWS cloud security technologies such as IoT Core, CloudWatch, and GuardDuty to protect IoT devices from threats, with the goal of maintaining user privacy and ensuring safety in our interconnected digital world. This comprehensive strategy aims to enhance security measures in both Docker and IoT sectors, strengthening the security framework in our interconnected world.
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.