Study and Analysis of Docker Internal System Security From Docker Daemon Attack and DDOS on The Open Journal System
Downloads
Introduction: The growing use of data centers encourages virtualization technology to become an alternative solution in virtualization to provide a dense environment that can be adjusted according to needs. In hypervisor-based virtualization technology in managing servers in the Open Journal System data center, network administrators must allocate resources that are large enough so that when developing web or mobile systems takes a long time, and in hypervisor-based virtualization techniques, they must have access to the host kernel.
Purpose: Research on the attack model and vulnerabilities of the Docker internal security system on the Open Journal System from the Docker daemon attack and DDoS attacks when building and managing the Docker internal system.
Method: This research begins with a literature study, network scope, system design, and system implementation based on plans that have been made, as well as testing, analysis, and concluding the tests that have been carried out.
Finding: At the testing stage, the results obtained were the success of the Docker system in handling DDoS attacks and the success of securing the Docker Daemon from Docker Daemon attacks.
Conclusion: The Docker Daemon Attack can occur by misconfiguring containers. This flaw allows an unauthorised party to take control of a container that has already been created. By gaining root access, attackers can perform various malicious activities within the container. Therefore, it is important to have an understanding and implementation of proper security practices in the management and configuration of Docker containers to reduce the risk of these types of attacks.
Keyword: Docker, Container, DDoS, Attack.
------------------------------------------
Studi dan Analisis Keamanan Sistem Internal Docker dari Docker Daemon Attack dan Ddos Pada Sistem Open Journal System
Pendahuluan: Berkembangnya penggunaan data center ini mendorong teknologi virtualisasi menjadi salah satu alternatif solusi dalam virtualisasi untuk menyediakan lingkungan yang padat agar dapat disesuaikan sesuai kebutuhan. Pada teknologi virtualisasi berbasis hypervisor dalam pengelolaan server pada data Open Journal System, center administrator jaringan harus mengalokasikan resources yang cukup besar, sehingga ketika dilakukan development sistem web atau mobile membutuhkan waktu yang lama, serta pada teknik virtualisasi berbasis hypervisor harus memiliki akses ke kernel host. Tujuan: Meneliti model serangan dan kerentanan sistem keamanan internal Docker pada Open Journal System dari ancaman Docker Daemon Attack dan serangan DDoS pada saat membangun dan mengelola sistem internal Docker.
Metode Penelitian: Penelitian ini dimulai dengan studi literatur, ruang lingkup jaringan, perancangan sistem, implementasi sistem berdasarkan rancangan yang telah dibuat, serta pengujian, analisis dan penarikan kesimpulan dari pengujian yang telah dilakukan.
Hasil Penelitian: Pada tahap pengujian dilakukan hasil yang didapatkan yaitu keberhasilan sistem docker dalam menangani serangan DdoS serta keberhasilan pengamanan docker daemon dari serangan docker daemon attack.
Kesimpulan: Serangan Docker Daemon dapat terjadi karena kesalahan konfigurasi container. Kelemahan ini memungkinkan pihak yang tidak berwenang untuk mengambil kendali atas container yang telah dibuat. Dengan mendapatkan akses root, penyerang dapat melakukan berbagai aktivitas berbahaya di dalam container. Oleh karena itu, penting untuk memiliki pemahaman dan penerapan praktik keamanan yang tepat dalam pengelolaan dan konfigurasi container Docker untuk mengurangi risiko jenis serangan ini.
Kata Kunci: Docker, Container, DDoS, Attack.
[1] C. Fiddin, R. Mayasari, and R. Munadi, Analisis performansi virtualisasi container menggunakan docker dibawah serangan networked denial of service, e-Proceeding Eng., vol. 5(1), pp. 281–290, 2018.
[2] M. F. Alauddin, R. M. Ijtihadie, and M. Husni, Implementasi virtual data center menggunakan linux container berbasis docker dan SDN, J. Tek. ITS, vol. 6(2), pp. 6–8, 2018.
[3] Salman Baset, S. B. (2016). Docker and Container Security. [4] [4]
[5] Ahamed, W. S. (2020). Information Systems Security and Assurance Management. Security Audit of Docker Container Images in Cloud Architecture, 1-12
[6] Apridayanti S, Saputra RA, Informatika JT, Teknik F, Oleo UH, Kunci K, Web A. 2018. Desain dan implementasi virtualisasi berbasis. SEMANTIK 4: 37–46.
[7] Bik MFR. 2017. Implementasi Docker Untuk Pengelolaan Banyak Aplikasi Web ( Studi Kasus : Jurusan Teknik Informatika UNESA ) Asmunin Abstrak. J. Manaj. Inform. 7: 46–50.
[8] Hung L, Kristiyanto D, Lee SB, Yeung KY. 2016. GUIdock : Using Docker Containers with a Common Graphics User Interface to Address the Reproducibility of Research. 1–14.
[9] Krochmalski J. 2017. Docker and Kubernetes for Java Developers, 1ste. Lennart Martens, UGent / VIB B, editor. Birmingham: Packt Publishing Ltd. 318 p.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
1. The journal allows the author to hold the copyright of the article without restrictions.2. The journal allows the author(s) to retain publishing rights without restrictions
3. The legal formal aspect of journal publication accessibility refers to Creative Commons Attribution- NonCommercial-ShareAlike: CC BY-NC-SA