This document discusses the unique challenges of intrusion detection and analysis in Linux container environments, highlighting that conventional methods are not directly applicable. It identifies a significant gap in security knowledge and the need for empirical research to develop effective security methods tailored to container technologies. The paper reviews existing literature and methods, advocating for adaptations of traditional intrusion detection approaches and the development of new techniques specific to container networks.