2020
DOI: 10.36227/techrxiv.12456299.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cloudstrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure

Abstract: <div>Most cyber-attacks and data breaches in cloud</div><div>infrastructure are due to human errors and misconfiguration</div><div>vulnerabilities. Cloud customer-centric tools are lacking, and existing</div><div>security models do not efficiently tackle these security challenges.</div><div>Novel security mechanisms are imperative, therefore, we</div><div>propose Risk-driven Fault Injection (RDFI) techniques to tackle</div><div&… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…To provide a concrete illustration of the contemporary cloud security issues, we present a realistic running example based on the Capital One data breach [36,40]. We used this running example for a related article [55] and we have decided to reuse it here since the topics are interrelated. The running example depicts the cyber-attacks against Capital One's AWS infrastructure between April -July 2019.…”
Section: Running Example -The Capital One Data Breachmentioning
confidence: 99%
See 2 more Smart Citations
“…To provide a concrete illustration of the contemporary cloud security issues, we present a realistic running example based on the Capital One data breach [36,40]. We used this running example for a related article [55] and we have decided to reuse it here since the topics are interrelated. The running example depicts the cyber-attacks against Capital One's AWS infrastructure between April -July 2019.…”
Section: Running Example -The Capital One Data Breachmentioning
confidence: 99%
“…• Security Chaos Engineering (SCE) [53,55] techniques are employed to validate that the changes do not introduce vulnerabilities to the cloud infrastructure. This could be done either in the development or production environment.…”
Section: Change Control Managementmentioning
confidence: 99%
See 1 more Smart Citation