17933865. NODE LEVEL CONTAINER MUTATION DETECTION simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

NODE LEVEL CONTAINER MUTATION DETECTION

Organization Name

International Business Machines Corporation

Inventor(s)

Hirokuni Kitahara of Sumida-ku (JP)

Yuji Watanabe of Chuouku (JP)

Kugamoorthy Gajananan of Toshima-ku (JP)

Ruriko Kudo of Saitama-shi (JP)

NODE LEVEL CONTAINER MUTATION DETECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17933865 titled 'NODE LEVEL CONTAINER MUTATION DETECTION

Simplified Explanation

The computer-implemented method described in the abstract involves determining container information associated with detected container mutation events. This method includes steps such as identifying system call events to the host operating system, determining the association of namespaces with existing containers, and designating child processes as mutation events to existing containers.

  • Determining system call events to the host operating system
  • Identifying namespaces associated with existing containers
  • Designating child processes as mutation events to existing containers
  • Determining container information associated with mutation events

Potential Applications

This technology could be applied in the field of container security to monitor and track changes within containers, helping to identify potential security breaches or unauthorized modifications.

Problems Solved

This technology helps in detecting and analyzing container mutation events, providing insights into any unauthorized changes or activities within containers, which can help in maintaining the integrity and security of containerized applications.

Benefits

The method described in the patent application allows for efficient monitoring and tracking of container mutation events, enabling quick detection and response to any suspicious activities within containers. This can enhance the overall security posture of containerized environments.

Potential Commercial Applications

One potential commercial application of this technology could be in the development of container security solutions for enterprises looking to secure their containerized applications and infrastructure effectively.

Possible Prior Art

One possible prior art in this field could be existing container security tools and solutions that offer similar functionalities for monitoring and analyzing container activities and events.

What are the specific technical details of the system call events being monitored in this method?

The specific technical details of the system call events being monitored in this method include calls to join a namespace, execute a parent process inside the namespace, and execute a child process inside the namespace. These events are crucial for determining the association of namespaces with existing containers and identifying mutation events within containers.

How does this method ensure the accuracy and reliability of the container information associated with mutation events?

This method ensures the accuracy and reliability of the container information associated with mutation events by systematically analyzing system call events, verifying the association of namespaces with containers, and designating specific child processes as mutation events. By following a structured approach to container monitoring and analysis, the method can provide precise and trustworthy container information related to mutation events.


Original Abstract Submitted

A computer-implemented method for determining container information associated with detected container mutation events is disclosed. The computer-implemented method includes: determining that a system call event to a host operating system includes a call to join a namespace and execute a parent process inside the namespace; determining that the namespace is associated with an existing container; responsive to determining that the namespace is associated with an existing container, determining that the system call event further includes a call to execute a child process inside the namespace; and responsive to determining that the system call event further includes a call to execute a child process inside the namespace: designating the child process as a mutation event to the existing container, and determining container information associated with the mutation event to the existing container. A corresponding computer system and computer program product are also disclosed.