2020
DOI: 10.1007/978-3-030-40921-0_9
|View full text |Cite
|
Sign up to set email alerts
|

An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud

Abstract: Cloud service providers offer their customers with on-demand and cost-effective services, scalable computing, and network infrastructures. Enterprises migrate their services to the cloud to utilize the benefit of cloud computing such as eliminating the capital expense of their computing need. There are security vulnerabilities and threats in the cloud. Many researches have been proposed to analyze the cloud security using Graphical Security Models (GSMs) and security metrics. In addition, it has been widely re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…For future work, we plan to deploy our proposed method on a realistic cloud-based environment [36,37] to enable the DQL agent to improve its self-learning capabilities and classify the threats with high accuracy in a real-time manner. We plan to apply our proposed model in improving the self-learning capabilities in detecting Android-based malware [38] and ransomware [39] to test the generalizability and practicability of our model.…”
Section: Discussionmentioning
confidence: 99%
“…For future work, we plan to deploy our proposed method on a realistic cloud-based environment [36,37] to enable the DQL agent to improve its self-learning capabilities and classify the threats with high accuracy in a real-time manner. We plan to apply our proposed model in improving the self-learning capabilities in detecting Android-based malware [38] and ransomware [39] to test the generalizability and practicability of our model.…”
Section: Discussionmentioning
confidence: 99%
“…Vulnerability scanning tools can scan network devices and software as well as cloud infrastructure to reveal configuration errors, unpatched and vulnerable devices, and known vulnerabilities [4,6]. SA can leverage the data collected from vulnerability scanning tools for more analysis.…”
Section: Vulnerability and Network Discoverymentioning
confidence: 99%
“…This phase consists of two steps: (1) cloud scanning that includes network and vulnerability scanning, and (2) model creation using HARM. The details of generating HARM is given in [11]. Cloud scanning phase uses OpenStack APIs to collect the required information such as the number of VMs, Hosts, Connectivity of VMs, etc.…”
Section: A Situation Perception Using Security Modelingmentioning
confidence: 99%
“…Cloud scanning phase uses OpenStack APIs to collect the required information such as the number of VMs, Hosts, Connectivity of VMs, etc. Moreover, it captures the vulnerabilities existing on each VMs through Nessus tool and APIs to automatically obtain the scan reports [11]. The main results of the first phase are a set of VMs and the reachabilities of them, and a set of vulnerabilities (V) existing on each VM.…”
Section: A Situation Perception Using Security Modelingmentioning
confidence: 99%
See 1 more Smart Citation