Skip to main content

2024 | OriginalPaper | Buchkapitel

Strengthening Cloud Applications: A Deep Dive into Kill Chain Identification, Scoring, and Automatic Penetration Testing

verfasst von : Stefano Simonetto

Erschienen in: Research Challenges in Information Science

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The need to anticipate and defend against potential threats is paramount in cybersecurity. This study addresses two fundamental questions: what attacks can be performed against my system, and how can these attacks be thwarted?
Addressing the first question, this work introduces an innovative method for generating executable attack programs, showcasing the practicality of potential breach scenarios. This approach not only establishes the theoretical vulnerability of a system but also underscores its susceptibility to exploitation.
To respond to the second question, the proposed approach explores a range of mechanisms to counter and thwart the exposed attack strategies. The aim is to use robust and adaptive defensive strategies, leveraging insights from the demonstrated attack programs. These mechanisms encompass proactive measures, such as automatic penetration testing and behavior analysis, and reactive approaches, such as rapid patch deployment and vulnerability prioritization. The resilience of systems against potential breaches can be enhanced by intertwining attack pathways with comprehensive countermeasures, thereby disrupting the adversary’s kill chains. This study aims to contribute to the containerized application security deployed in different environments, like the Cloud, Edge, 5G, Internet of Things (IoT), and Industrial IoT (IIoT), by taking these scenarios as a case study.
This research contributes to the evolution of cyber threat analysis through a Design Science Research (DSR) approach, focusing on developing and validating artifacts, tools, and frameworks. Defenders can anticipate, combat, and ultimately mitigate emerging threats in an increasingly complex digital environment by creating tangible attack programs and formulating effective thwarting mechanisms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
9.
Zurück zum Zitat Grigorescu, O., Nica, A., Dascalu, M., Rughinis, R.: CVE2ATT &CK: BERT-based mapping of CVEs to MITRE ATT &CK techniques. Algorithms 15(9), 314 (2022)CrossRef Grigorescu, O., Nica, A., Dascalu, M., Rughinis, R.: CVE2ATT &CK: BERT-based mapping of CVEs to MITRE ATT &CK techniques. Algorithms 15(9), 314 (2022)CrossRef
10.
Zurück zum Zitat Gupta, C., van Ede, T., Continella, A.: Honeykube: designing and deploying a microservices-based web honeypot. In: SecWeb 2023 (2023) Gupta, C., van Ede, T., Continella, A.: Honeykube: designing and deploying a microservices-based web honeypot. In: SecWeb 2023 (2023)
11.
Zurück zum Zitat Hemberg, E., et al.: Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting. arXiv preprint arXiv:2010.00533 (2020) Hemberg, E., et al.: Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting. arXiv preprint arXiv:​2010.​00533 (2020)
12.
Zurück zum Zitat Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 75–105 (2004) Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 75–105 (2004)
13.
Zurück zum Zitat Hutchins, E.M., Cloppert, M.J., Amin, R.M., et al.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In: Leading Issues in Information Warfare & Security Research, vol. 1, no. 1, p. 80 (2011) Hutchins, E.M., Cloppert, M.J., Amin, R.M., et al.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In: Leading Issues in Information Warfare & Security Research, vol. 1, no. 1, p. 80 (2011)
15.
Zurück zum Zitat Kaushik, P., Rao, A.M., Singh, D.P., Vashisht, S., Gupta, S.: Cloud computing and comparison based on service and performance between amazon AWS, Microsoft Azure, and google cloud. In: 2021 International Conference on Technological Advancements and Innovations (ICTAI), pp. 268–273. IEEE (2021) Kaushik, P., Rao, A.M., Singh, D.P., Vashisht, S., Gupta, S.: Cloud computing and comparison based on service and performance between amazon AWS, Microsoft Azure, and google cloud. In: 2021 International Conference on Technological Advancements and Innovations (ICTAI), pp. 268–273. IEEE (2021)
16.
Zurück zum Zitat Koziolek, H., Eskandani, N.: Lightweight kubernetes distributions: a performance comparison of MicroK8s, k3s, k0s, and Microshift. In: Proceedings of the 2023 ACM/SPEC International Conference on Performance Engineering (2023) Koziolek, H., Eskandani, N.: Lightweight kubernetes distributions: a performance comparison of MicroK8s, k3s, k0s, and Microshift. In: Proceedings of the 2023 ACM/SPEC International Conference on Performance Engineering (2023)
17.
Zurück zum Zitat Loureiro, S.: Security misconfigurations and how to prevent them. Netw. Secur. 2021(5), 13–16 (2021)CrossRef Loureiro, S.: Security misconfigurations and how to prevent them. Netw. Secur. 2021(5), 13–16 (2021)CrossRef
18.
Zurück zum Zitat Minna, F., Massacci, F.: SoK: run-time security for cloud microservices. are we there yet?. Comput. Secur. 103119 (2023) Minna, F., Massacci, F.: SoK: run-time security for cloud microservices. are we there yet?. Comput. Secur. 103119 (2023)
21.
Zurück zum Zitat Simonetto, S., Bosch, P.: Are we reasoning about cloud application vulnerabilities in the right way? In: 8th IEEE European Symposium on Security and Privacy (2023) Simonetto, S., Bosch, P.: Are we reasoning about cloud application vulnerabilities in the right way? In: 8th IEEE European Symposium on Security and Privacy (2023)
Metadaten
Titel
Strengthening Cloud Applications: A Deep Dive into Kill Chain Identification, Scoring, and Automatic Penetration Testing
verfasst von
Stefano Simonetto
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-59468-7_13

Premium Partner