Please wait a minute...
Computer & Telecommunication  2024, Vol. 1 Issue (6): 22-    DOI: 10.15966/j.cnki.dnydx.2024.06.012
Current Issue | Archive | Adv Search |
Risk Analysis and Prevention of Unauthorized Access to Docker API and SpringBoot Actuator
Daqing Normal University
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  With the popularization of cloud computing technology and the development of containerization technology, Docker and SpringBoot have become indispensable tools for modern software development and deployment. However, this widespread use also comes with security risks. This article provides an in-depth analysis of the unauthorized access risks of Docker API and SpringBoot Actor. When these critical components are exposed to unauthorized access, attackers may exploit these vulnerabilities to perform malicious operations, such as deploying malicious containers, tampering with application con?gurations, or stealing sensitive information. These behaviors may not only lead to service interruption and data leakage, but also cause serious reputation and ?nancial losses to the enterprise. 
Key wordsDocker API      SpringBoot Actuator      unauthorized access vulnerability      risk analysis and prevention      
Published: 01 November 2024

Cite this article:

JIA Mei-juan ZHU Qing JIANG Shan ZHANG Li-hua ZHANG Bai-shun. Risk Analysis and Prevention of Unauthorized Access to Docker API and SpringBoot Actuator. Computer & Telecommunication, 2024, 1(6): 22-.

URL:

https://www.computertelecom.com.cn/EN/10.15966/j.cnki.dnydx.2024.06.012     OR     https://www.computertelecom.com.cn/EN/Y2024/V1/I6/22

No related articles found!
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd