Visible to the public Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems

TitleCloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Publication TypeConference Paper
Year of Publication2015
AuthorsAydin, M., Jacob, J.
Conference Name2015 European Intelligence and Security Informatics Conference
Date PublishedSept. 2015
PublisherIEEE
ISBN Number978-1-4799-8657-6
KeywordsAnalytical models, cloud computing, cloud security threat modelling tool, Cloud-COVER model, Computational modeling, controls and orderings for vulnerabilities and exposures model, Data models, graph model, graph theory, modelling, propagation analysis, pubcrawl170107, pubcrawl170108, risk management, security, security of data, system threat prioritization, threat modelling, user security attribute preference
Abstract

We present Cloud-COVER (Controls and Orderings for Vulnerabilities and ExposuRes), a cloud security threat modelling tool. Cloud-COVER takes input from a user about their deployment, requiring information about the data, instances, connections, their properties, and the importance of various security attributes. This input is used to analyse the relevant threats, and the way they propagate through the system. They are then presented to the user, ordered according to the security attributes they have prioritised, along with the best countermeasures to secure against the dangers listed.

URLhttps://ieeexplore.ieee.org/document/7379723
DOI10.1109/EISIC.2015.11
Citation Keyaydin_cloud-cover:_2015