A Proposed Framework for the Active Detection of Security Vulnerabilities in Multi-tenancy Cloud Systems
The detection of cyber attacks before they are successful represents an essential stage in the evolution of an attack vector centric security framework. Anti-virus, Malware and Firewalls detection & protection ideologies are proving to be ineffective and they were never designed with multi-tenan...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The detection of cyber attacks before they are successful represents an essential stage in the evolution of an attack vector centric security framework. Anti-virus, Malware and Firewalls detection & protection ideologies are proving to be ineffective and they were never designed with multi-tenant cloud environments in mind. The current security solution development is driven by the complexity of the gap analysis performed by hacker groups and multi-tenant cloud solutions represent a significant target to hacker groups so it is important for Cloud providers to take pre-emptive steps to ensure the total security of their services. A multi-tenant environment irrespective of the number of users is still an individual system and multi-tenant cloud solutions require active protection as the individual system components can still be compromised with a previously unknown attack vector. One possible solution to this growing security concern is an approach that continuously validates user interactions within a system and takes automated preemptive steps to promote the protection of the system users. By gathering information on the attack vector and the attacker themselves it is possible to predict the aim of the attack, gauging the risk and making assumptions. The ultimate goal is to identify and close the attack vector during the attackers gap analysis while ensuring at all time that the information gathered can be isolated to a legal forensic standard. With the ultimate goal being the ability to share malicious user activity information with authorities without the risk of accidental data leakage of other tenants data. This paper describes a possible system and methodology that would prevent the gap analysis phase of a cyber-attack. |
---|---|
DOI: | 10.1109/EIDWT.2012.43 |