2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 2019
DOI: 10.1109/cybersecpods.2019.8885401
|View full text |Cite
|
Sign up to set email alerts
|

A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing

Abstract: Attacks on cloud-computing services are becoming more prevalent with recent victims including Tesla, Aviva Insurance and SIM-card manufacturer Gemalto [1]. The risk posed to organisations from malicious insiders is becoming more widely known about and consequently many are now investing in hardware, software and new processes to try to detect these attacks. As for all types of attack vector, there will always be those which are not known about and those which are known about but remain exceptionally difficult … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 7 publications
0
3
0
1
Order By: Relevance
“…Over the last few years, attack methods [8][9][10][11][12][13] have grown with the evolution of fundamental technology and architecture of applications (e.g. JavaScript attacks [20], and attacks on cloudcomputing services [21]), and hence the update [14] of OWASP Top 10 as illustrated in Table 1 below.…”
Section: Methodology In Owasp Risk Ratingmentioning
confidence: 99%
“…Over the last few years, attack methods [8][9][10][11][12][13] have grown with the evolution of fundamental technology and architecture of applications (e.g. JavaScript attacks [20], and attacks on cloudcomputing services [21]), and hence the update [14] of OWASP Top 10 as illustrated in Table 1 below.…”
Section: Methodology In Owasp Risk Ratingmentioning
confidence: 99%
“…В работе [5] описано решение задачи противодействия атакам на сервисы облачных вычислений со стороны инсайдеров, для чего комбинируется пара методов путем их наложения. Первый основан на классическом дереве атак, примененном к внутренней среде облачных сервисов; второй представляет собой, так называемую, цепочку уничтожения, вышедшую из концепции ведения боевых действий и заключающуюся в отслеживании степени продвижения атаки к заданным целям.…”
Section: обзор релевантных работunclassified
“…We clarify the nature and state of the insiders with respect to and with reference to the cloud ecosystem. [7] Symptomatic Insider:…”
Section: Of Trade Secretsmentioning
confidence: 99%