Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

被引:0
作者
Manzoor, Salman [1 ]
Gouglidis, Antonios [1 ]
Bradbury, Matthew [1 ]
Suri, Neeraj [1 ]
机构
[1] Univ Lancaster, Lancaster LA1 4YW, England
关键词
Cloud computing; Security; Analytical models; Behavioral sciences; Computational modeling; Elasticity; Data models; Cloud security; cloud functional model; threat analysis; RISK-ASSESSMENT; SECURITY; ATTACK; REQUIREMENTS; FRAMEWORK; DEFENSE; MODEL;
D O I
10.1109/TCC.2024.3365736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most Threat Analysis (TA) techniques analyze threats to targeted assets (e.g., components, services) by considering static interconnections among them. However, in dynamic environments, e.g., the Cloud, resources can instantiate, migrate across physical hosts, or decommission to provide rapid resource elasticity to its users. Existing TA techniques are not capable of addressing such requirements. Moreover, complex multi-layer/multi-asset attacks on Cloud systems are increasing, e.g., the Equifax data breach; thus, TA approaches must be able to analyze them. This article proposes ThreatPro, which supports dynamic interconnections and analysis of multi-layer attacks in the Cloud. ThreatPro facilitates threat analysis by developing a technology-agnostic information flow model, representing the Cloud's functionality through conditional transitions. The model establishes the basis to capture the multi-layer and dynamic interconnections during the life cycle of a Virtual Machine. ThreatPro contributes to (1) enabling the exploration of a threat's behavior and its propagation across the Cloud, and (2) assessing the security of the Cloud by analyzing the impact of multiple threats across various operational layers/assets. Using public information on threats from the National Vulnerability Database, we validate ThreatPro's capabilities, i.e., identify and trace actual Cloud attacks and speculatively postulate alternate potential attack paths.
引用
收藏
页码:319 / 336
页数:18
相关论文
共 53 条
  • [1] Abusaimeh H., 2020, International Journal of Advanced Trends in Computer Science and Engineering, V9, P4141, DOI DOI 10.30534/IJATCSE/2020/243932020
  • [2] Towards a Formal Foundation of Web Security
    Akhawe, Devdatta
    Barth, Adam
    Lam, Peifung E.
    Mitchell, John
    Song, Dawn
    [J]. 2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 290 - 304
  • [3] Threat Modeling for Cloud Data Center Infrastructures
    Alhebaishi, Nawaf
    Wang, Lingyu
    Jajodia, Sushil
    Singhal, Anoop
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 302 - 319
  • [4] [Anonymous], National Security Branch
  • [5] Benzadri Z, 2014, LECT NOTES COMPUT SC, V8377, P381, DOI 10.1007/978-3-319-06859-6_34
  • [6] Inferring Models of Concurrent Systems from Logs of Their Behavior with CSight
    Beschastnikh, Ivan
    Brun, Yuriy
    Ernst, Michael D.
    Krishnamurthy, Arvind
    [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 468 - 479
  • [7] A Formal Model of Client-Cloud Interaction
    Bosa, Karoly
    Holom, Roxana-Maria
    Vleju, Mircea Boris
    [J]. CORRECT SOFTWARE IN WEB APPLICATIONS AND WEB SERVICES, 2015, : 83 - 144
  • [8] Boubour R, 1997, IEEE DECIS CONTR P, P720, DOI 10.1109/CDC.1997.650720
  • [9] A Petri Net-Based Approach to Model and Analyze the Management of Cloud Applications
    Brogi, Antonio
    Canciani, Andrea
    Soldani, Jacopo
    Wang, PengWei
    [J]. TRANSACTIONS ON PETRI NETS AND OTHER MODELS OF CONCURRENCY XI, 2016, 9930 : 28 - 48
  • [10] Clarke E, 2001, LECT NOTES COMPUT SC, V2000, P176