JOURNAL ARTICLE

Rule-based Security Monitoring of Containerized Workloads

Abstract

In order to further support the secure operation of containerized environments and to extend already established security measures, we propose a rule-based security monitoring, which can be used for the detection of a variety of misuse and attacks. The capabilities of the open-source tools used to monitor containers are closely examined and the possibility of detecting undesired behavior is evaluated on the basis of various scenarios. Further, the limits of the approach taken and the associated performance overhead will be discussed. The results show that the proposed approach is effective in many scenarios and comes at a low performance overhead cost.

Keywords:
Computer science Computer security

Metrics

7
Cited By
0.58
FWCI (Field Weighted Citation Impact)
16
Refs
0.68
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Industrial Automation and Control Systems
Physical Sciences →  Engineering →  Control and Systems Engineering
Advanced Manufacturing and Logistics Optimization
Physical Sciences →  Engineering →  Industrial and Manufacturing Engineering

Related Documents

BOOK-CHAPTER

Rule-Based Security Monitoring of Containerized Environments

Holger GantikowChristoph ReichMartin KnahlNathan Clarke

Communications in computer and information science Year: 2020 Pages: 66-86
JOURNAL ARTICLE

Integrating Machine Learning into the Security of Containerized Workloads

Srikanth Nimmagadda

Journal:   Journal of Computer Science and Technology Studies Year: 2025 Vol: 7 (9)Pages: 135-142
JOURNAL ARTICLE

Securing Containerized Workloads: A Strategic Approach to Enterprise Container Security

Santosh Datta Bompally

Journal:   European Journal of Computer Science and Information Technology Year: 2025 Vol: 13 (8)Pages: 71-80
© 2026 ScienceGate Book Chapters — All rights reserved.