Home > Research > Publications & Outputs > Enabling Multi-Layer Threat Analysis in Dynamic...

Electronic data

  • IEEE_TCC_ThreatPro

    Accepted author manuscript, 1.58 MB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments. / Manzoor, Salman; Gouglidis, Antonios; Bradbury, Matthew et al.
In: IEEE Transactions on Cloud Computing, Vol. 12, No. 1, 31.03.2024, p. 319-336.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Manzoor S, Gouglidis A, Bradbury M, Suri N. Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments. IEEE Transactions on Cloud Computing. 2024 Mar 31;12(1):319-336. Epub 2024 Feb 13. doi: 10.1109/TCC.2024.3365736

Author

Manzoor, Salman ; Gouglidis, Antonios ; Bradbury, Matthew et al. / Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments. In: IEEE Transactions on Cloud Computing. 2024 ; Vol. 12, No. 1. pp. 319-336.

Bibtex

@article{dbd42e3ed2bd406cb3ccc6a48de4db87,
title = "Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments",
abstract = "Most Threat Analysis (TA) techniques analyze threats to targeted assets (e.g., components, services) by considering static interconnections among them. However, in dynamic environments, e.g., the Cloud, resources can instantiate, migrate across physical hosts, or decommission to provide rapid resource elasticity to its users. Existing TA techniques are not capable of addressing such requirements. Moreover, complex multi-layer/multi-asset attacks on Cloud systems are increasing, e.g., the Equifax data breach; thus, TA approaches must be able to analyze them. This paper proposes ThreatPro, which supports dynamic interconnections and analysis of multi-layer attacks in the Cloud. ThreatPro facilitates threat analysis by developing a technology-agnostic information flow model, representing the Cloud's functionality through conditional transitions. The model establishes the basis to capture the multi-layer and dynamic interconnections during the life cycle of a Virtual Machine. ThreatPro contributes to (1) enabling the exploration of a threat's behavior and its propagation across the Cloud, and (2) assessing the security of the Cloud by analyzing the impact of multiple threats across various operational layers/assets. Using public information on threats from the National Vulnerability Database, we validate ThreatPro's capabilities, i.e., identify and trace actual Cloud attacks and speculatively postulate alternate potential attack paths.",
author = "Salman Manzoor and Antonios Gouglidis and Matthew Bradbury and Neeraj Suri",
year = "2024",
month = mar,
day = "31",
doi = "10.1109/TCC.2024.3365736",
language = "English",
volume = "12",
pages = "319--336",
journal = "IEEE Transactions on Cloud Computing",
issn = "2168-7161",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "1",

}

RIS

TY - JOUR

T1 - Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

AU - Manzoor, Salman

AU - Gouglidis, Antonios

AU - Bradbury, Matthew

AU - Suri, Neeraj

PY - 2024/3/31

Y1 - 2024/3/31

N2 - Most Threat Analysis (TA) techniques analyze threats to targeted assets (e.g., components, services) by considering static interconnections among them. However, in dynamic environments, e.g., the Cloud, resources can instantiate, migrate across physical hosts, or decommission to provide rapid resource elasticity to its users. Existing TA techniques are not capable of addressing such requirements. Moreover, complex multi-layer/multi-asset attacks on Cloud systems are increasing, e.g., the Equifax data breach; thus, TA approaches must be able to analyze them. This paper proposes ThreatPro, which supports dynamic interconnections and analysis of multi-layer attacks in the Cloud. ThreatPro facilitates threat analysis by developing a technology-agnostic information flow model, representing the Cloud's functionality through conditional transitions. The model establishes the basis to capture the multi-layer and dynamic interconnections during the life cycle of a Virtual Machine. ThreatPro contributes to (1) enabling the exploration of a threat's behavior and its propagation across the Cloud, and (2) assessing the security of the Cloud by analyzing the impact of multiple threats across various operational layers/assets. Using public information on threats from the National Vulnerability Database, we validate ThreatPro's capabilities, i.e., identify and trace actual Cloud attacks and speculatively postulate alternate potential attack paths.

AB - Most Threat Analysis (TA) techniques analyze threats to targeted assets (e.g., components, services) by considering static interconnections among them. However, in dynamic environments, e.g., the Cloud, resources can instantiate, migrate across physical hosts, or decommission to provide rapid resource elasticity to its users. Existing TA techniques are not capable of addressing such requirements. Moreover, complex multi-layer/multi-asset attacks on Cloud systems are increasing, e.g., the Equifax data breach; thus, TA approaches must be able to analyze them. This paper proposes ThreatPro, which supports dynamic interconnections and analysis of multi-layer attacks in the Cloud. ThreatPro facilitates threat analysis by developing a technology-agnostic information flow model, representing the Cloud's functionality through conditional transitions. The model establishes the basis to capture the multi-layer and dynamic interconnections during the life cycle of a Virtual Machine. ThreatPro contributes to (1) enabling the exploration of a threat's behavior and its propagation across the Cloud, and (2) assessing the security of the Cloud by analyzing the impact of multiple threats across various operational layers/assets. Using public information on threats from the National Vulnerability Database, we validate ThreatPro's capabilities, i.e., identify and trace actual Cloud attacks and speculatively postulate alternate potential attack paths.

U2 - 10.1109/TCC.2024.3365736

DO - 10.1109/TCC.2024.3365736

M3 - Journal article

VL - 12

SP - 319

EP - 336

JO - IEEE Transactions on Cloud Computing

JF - IEEE Transactions on Cloud Computing

SN - 2168-7161

IS - 1

ER -