Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Title | Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Aydin, M., Jacob, J. |
Conference Name | 2015 European Intelligence and Security Informatics Conference |
Date Published | Sept. 2015 |
Publisher | IEEE |
ISBN Number | 978-1-4799-8657-6 |
Keywords | Analytical models, cloud computing, cloud security threat modelling tool, Cloud-COVER model, Computational modeling, controls and orderings for vulnerabilities and exposures model, Data models, graph model, graph theory, modelling, propagation analysis, pubcrawl170107, pubcrawl170108, risk management, security, security of data, system threat prioritization, threat modelling, user security attribute preference |
Abstract | We present Cloud-COVER (Controls and Orderings for Vulnerabilities and ExposuRes), a cloud security threat modelling tool. Cloud-COVER takes input from a user about their deployment, requiring information about the data, instances, connections, their properties, and the importance of various security attributes. This input is used to analyse the relevant threats, and the way they propagate through the system. They are then presented to the user, ordered according to the security attributes they have prioritised, along with the best countermeasures to secure against the dangers listed. |
URL | https://ieeexplore.ieee.org/document/7379723 |
DOI | 10.1109/EISIC.2015.11 |
Citation Key | aydin_cloud-cover:_2015 |
- modelling
- user security attribute preference
- threat modelling
- system threat prioritization
- security of data
- security
- risk management
- pubcrawl170108
- pubcrawl170107
- propagation analysis
- Analytical models
- graph theory
- graph model
- Data models
- controls and orderings for vulnerabilities and exposures model
- Computational modeling
- Cloud-COVER model
- cloud security threat modelling tool
- Cloud Computing