A proposed framework for the active detection of security vulnerabilities in multi-tenancy cloud systems

Jason Flood, Anthony Keane

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The detection of cyber attacks before they are successful represents an essential stage in the evolution of an attack vector centric security framework. Anti-virus, Malware and Firewalls detection & protection ideologies are proving to be ineffective and they were never designed with multi-tenant cloud environments in mind. The current security solution development is driven by the complexity of the gap analysis performed by hacker groups and multi-tenant cloud solutions represent a significant target to hacker groups so it is important for Cloud providers to take pre-emptive steps to ensure the total security of their services. A multi-tenant environment irrespective of the number of users is still an individual system and multi-tenant cloud solutions require active protection as the individual system components can still be compromised with a previously unknown attack vector. One possible solution to this growing security concern is an approach that continuously validates user interactions within a system and takes automated preemptive steps to promote the protection of the system users. By gathering information on the attack vector and the attacker themselves it is possible to predict the aim of the attack, gauging the risk and making assumptions. The ultimate goal is to identify and close the attack vector during the attackers gap analysis while ensuring at all time that the information gathered can be isolated to a legal forensic standard. With the ultimate goal being the ability to share malicious user activity information with authorities without the risk of accidental data leakage of other tenants data. This paper describes a possible system and methodology that would prevent the gap analysis phase of a cyber-attack.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012
Pages231-235
Number of pages5
DOIs
Publication statusPublished - 2012
Event3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012 - Bucharest, Romania
Duration: 19 Sep 201221 Sep 2012

Publication series

NameProceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012

Conference

Conference3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012
Country/TerritoryRomania
CityBucharest
Period19/09/1221/09/12

Keywords

  • cybercrime
  • forensics
  • multi-tenancy security

Fingerprint

Dive into the research topics of 'A proposed framework for the active detection of security vulnerabilities in multi-tenancy cloud systems'. Together they form a unique fingerprint.

Cite this