Home > Research > Publications & Outputs > Poster: Multi-Layer Threat Analysis of the Cloud

Electronic data

  • ACM_CCS__ThreatPro_Poster_

    Rights statement: © ACM, 2022. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, http://doi.acm.org/10.1145/3548606.3563515

    Accepted author manuscript, 644 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Poster: Multi-Layer Threat Analysis of the Cloud

Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

Published

Standard

Poster: Multi-Layer Threat Analysis of the Cloud. / Manzoor, Salman; Gouglidis, Antonios; Bradbury, Matthew et al.
2022. 3419-3421 Poster session presented at ACM Conference on Computer and Communications Security, Los Angeles, United States.

Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

Harvard

Manzoor, S, Gouglidis, A, Bradbury, M & Suri, N 2022, 'Poster: Multi-Layer Threat Analysis of the Cloud', ACM Conference on Computer and Communications Security, Los Angeles, United States, 7/11/22 - 11/11/22 pp. 3419-3421. https://doi.org/10.1145/3548606.3563515

APA

Manzoor, S., Gouglidis, A., Bradbury, M., & Suri, N. (2022). Poster: Multi-Layer Threat Analysis of the Cloud. 3419-3421. Poster session presented at ACM Conference on Computer and Communications Security, Los Angeles, United States. https://doi.org/10.1145/3548606.3563515

Vancouver

Manzoor S, Gouglidis A, Bradbury M, Suri N. Poster: Multi-Layer Threat Analysis of the Cloud. 2022. Poster session presented at ACM Conference on Computer and Communications Security, Los Angeles, United States. doi: 10.1145/3548606.3563515

Author

Manzoor, Salman ; Gouglidis, Antonios ; Bradbury, Matthew et al. / Poster: Multi-Layer Threat Analysis of the Cloud. Poster session presented at ACM Conference on Computer and Communications Security, Los Angeles, United States.3 p.

Bibtex

@conference{d5445c046081481b9888be5992aac5be,
title = "Poster: Multi-Layer Threat Analysis of the Cloud",
abstract = "A variety of Threat Analysis (TA) techniques exist that typically target exploring threats to discrete assets (e.g., services, data, etc.) and reveal potential attacks pertinent to these assets. Furthermore, these techniques assume that the interconnection among the assets is static. However, in the Cloud, resources can instantiate or migrate across physical hosts at run-time, thus making the Cloud a dynamic environment. Additionally, the number of attacks targeting multiple assets/layers emphasizes the need for threat analysis approaches developed for Cloud environments. Therefore, this proposal presents a novel threat analysis approach that specifically addresses multi-layer attacks. The proposed approach facilitates threat analysis by developing a technology-agnostic information flow model. It contributes to exploring a threat's propagation across the operational stack of the Cloud and, consequently, holistically assessing the security of the Cloud.",
author = "Salman Manzoor and Antonios Gouglidis and Matthew Bradbury and Neeraj Suri",
note = "{\textcopyright} ACM, 2022. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, http://doi.acm.org/10.1145/3548606.3563515; ACM Conference on Computer and Communications Security, CCS ; Conference date: 07-11-2022 Through 11-11-2022",
year = "2022",
month = nov,
day = "7",
doi = "10.1145/3548606.3563515",
language = "English",
pages = "3419--3421",
url = "https://www.sigsac.org/ccs/CCS2022/",

}

RIS

TY - CONF

T1 - Poster: Multi-Layer Threat Analysis of the Cloud

AU - Manzoor, Salman

AU - Gouglidis, Antonios

AU - Bradbury, Matthew

AU - Suri, Neeraj

N1 - © ACM, 2022. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, http://doi.acm.org/10.1145/3548606.3563515

PY - 2022/11/7

Y1 - 2022/11/7

N2 - A variety of Threat Analysis (TA) techniques exist that typically target exploring threats to discrete assets (e.g., services, data, etc.) and reveal potential attacks pertinent to these assets. Furthermore, these techniques assume that the interconnection among the assets is static. However, in the Cloud, resources can instantiate or migrate across physical hosts at run-time, thus making the Cloud a dynamic environment. Additionally, the number of attacks targeting multiple assets/layers emphasizes the need for threat analysis approaches developed for Cloud environments. Therefore, this proposal presents a novel threat analysis approach that specifically addresses multi-layer attacks. The proposed approach facilitates threat analysis by developing a technology-agnostic information flow model. It contributes to exploring a threat's propagation across the operational stack of the Cloud and, consequently, holistically assessing the security of the Cloud.

AB - A variety of Threat Analysis (TA) techniques exist that typically target exploring threats to discrete assets (e.g., services, data, etc.) and reveal potential attacks pertinent to these assets. Furthermore, these techniques assume that the interconnection among the assets is static. However, in the Cloud, resources can instantiate or migrate across physical hosts at run-time, thus making the Cloud a dynamic environment. Additionally, the number of attacks targeting multiple assets/layers emphasizes the need for threat analysis approaches developed for Cloud environments. Therefore, this proposal presents a novel threat analysis approach that specifically addresses multi-layer attacks. The proposed approach facilitates threat analysis by developing a technology-agnostic information flow model. It contributes to exploring a threat's propagation across the operational stack of the Cloud and, consequently, holistically assessing the security of the Cloud.

U2 - 10.1145/3548606.3563515

DO - 10.1145/3548606.3563515

M3 - Poster

SP - 3419

EP - 3421

T2 - ACM Conference on Computer and Communications Security

Y2 - 7 November 2022 through 11 November 2022

ER -