Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments
The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and operated do not lend themselves…