Research on Docker Breakout Attack and Defense of Docker Container Vulnerabilities
With the advancement of computer technology,Docker container technology is known for its host deployment characteristics,has found widespread application in internet services.However,the prominence of information security issues arising from software vulnerabilities cannot be overlooked.This research explores the deployment and application of Docker containers,comparing their technical architecture and resource utilization advantages with traditional virtual machine technolo-gy.By deploying virtual machines and image simulations to replicate real-world environments,a comprehensive network intru-sion process is constructed.Intrusion experiments are carried out using high-risk Docker vulnerabilities,namely CVE-2020-15257 and CVE-2019-5736,resulting in container escape and the acquisition of elevated privileges on the host machine.