Many effective Threat Analysis (TA) techniques exist that focus on analyzing threats to targeted assets (e.g., components, services). These techniques consider static interconnections among the assets. However, in dynamic environments, such as the Cloud, resources can instantiate, migrate across physical hosts, or decommission to provide rapid resource elasticity to the users. It is evident that existing TA techniques cannot address all these requirements. In addition, there is an increasing number of complex multi-layer/multi-asset attacks on Cloud systems, such as the Equifax data breach. Hence, there is a need for threat analysis approaches that are designed to analyze threats in complex, dynamic, and multi-layer Cloud environments. In this paper, we propose ThreatPro that addresses the analysis of multi-layer attacks and supports dynamic interconnections in the Cloud. ThreatPro facilitates threat analysis by developing a technology-agnostic information flow model, which represents the Cloud's functionality through a set of conditional transitions. The model establishes the basis to capture the multi-layer and dynamic interconnections during the life-cycle of a Virtual Machine (VM). Specifically, ThreatPro contributes in (a) enabling the exploration of a threat's behavior and its propagation across the Cloud, and (b) assessing the security of the Cloud by analyzing the impact of multiple threats across various operational layers/assets. Using public information on threats from the National Vulnerability Database (NVD), we validate ThreatPro's capabilities, i.e., (a) identify and trace actual Cloud attacks and (b) speculatively postulate alternate potential attack paths.
翻译:现有许多有效的威胁分析(TA)技术侧重于分析对目标资产的威胁(例如,部件、服务等),这些技术考虑到资产之间的静态相互联系,然而,在云体等动态环境中,资源可以即时、跨物理主机迁移或退役,为用户提供快速的资源弹性;现有的技术评估技术不能满足所有这些要求;此外,对云系统的复杂多层/多资产袭击越来越多,如Equifax数据断路。因此,需要采用威胁分析方法,以分析复杂、动态和多层云层环境中的威胁;但在云层等动态环境中,资源可以即时、跨物理主机体迁移或退役,以便为用户提供快速的资源弹性资源;很明显,现有的技术评估技术评估技术评估技术评估信息流动模式无法满足所有这些要求;此外,对云层系统进行一系列有条件的转换,从而形成云层/多层/多层攻击。因此,有必要采用威胁分析方法来分析在复杂、动态和多层云层云层云层环境中的威胁;具体而言,威胁方案将威胁分析多层攻击的实际能力用于(a),通过分析各种威胁的变压层/变压层,并分析各种威胁。