论文标题
威胁:云中的多层威胁分析
ThreatPro: Multi-Layer Threat Analysis in the Cloud
论文作者
论文摘要
存在许多有效的威胁分析(TA)技术,侧重于分析对目标资产的威胁(例如组件,服务)。这些技术考虑资产之间的静态互连。但是,在动态环境中,例如云,资源可以实例化,跨物理主机迁移或退役以为用户提供快速的资源弹性。显然,现有的TA技术无法解决所有这些要求。此外,对云系统(例如Equifax数据泄露)的复杂多层/多资产攻击的数量越来越多。因此,需要采用威胁分析方法,旨在分析复杂,动态和多层云环境中的威胁。在本文中,我们提出了威胁性,该威胁要解决多层攻击的分析并支持云中的动态互连。威胁性通过开发技术不足的信息流模型来促进威胁分析,该模型通过一组有条件的过渡来代表云的功能。该模型建立了在虚拟机(VM)生命周期期间捕获多层和动态互连的基础。具体而言,theakpro在(a)促进威胁行为及其在整个云中传播的探索,以及(b)通过分析各种操作层/资产的多种威胁的影响来评估云的安全性。使用有关国家漏洞数据库(NVD)威胁的公共信息,我们验证了威胁性的功能,即,(a)识别和追踪实际的云攻击,以及(b)推测替代潜在的攻击路径。
Many effective Threat Analysis (TA) techniques exist that focus on analyzing threats to targeted assets (e.g., components, services). These techniques consider static interconnections among the assets. However, in dynamic environments, such as the Cloud, resources can instantiate, migrate across physical hosts, or decommission to provide rapid resource elasticity to the users. It is evident that existing TA techniques cannot address all these requirements. In addition, there is an increasing number of complex multi-layer/multi-asset attacks on Cloud systems, such as the Equifax data breach. Hence, there is a need for threat analysis approaches that are designed to analyze threats in complex, dynamic, and multi-layer Cloud environments. In this paper, we propose ThreatPro that addresses the analysis of multi-layer attacks and supports dynamic interconnections in the Cloud. ThreatPro facilitates threat analysis by developing a technology-agnostic information flow model, which represents the Cloud's functionality through a set of conditional transitions. The model establishes the basis to capture the multi-layer and dynamic interconnections during the life-cycle of a Virtual Machine (VM). Specifically, ThreatPro contributes in (a) enabling the exploration of a threat's behavior and its propagation across the Cloud, and (b) assessing the security of the Cloud by analyzing the impact of multiple threats across various operational layers/assets. Using public information on threats from the National Vulnerability Database (NVD), we validate ThreatPro's capabilities, i.e., (a) identify and trace actual Cloud attacks and (b) speculatively postulate alternate potential attack paths.