...
首页> 外文期刊>Cloud Computing, IEEE >Trust Erosion: Dealing with Unknown-Unknowns in Cloud Security
【24h】

Trust Erosion: Dealing with Unknown-Unknowns in Cloud Security

机译:信任侵蚀:处理云安全中的未知未知

获取原文
获取原文并翻译 | 示例
           

摘要

Although todays average cloud computing environment may incorporate security in most aspects of its design and infrastructure, the mere operation of the network exposes it to attacks. A typical attack starts with probing for weaknesses and/or vulnerabilities that can be exploited. And it is at this stage that the battle seems to be already lost, as the average network is insufficiently equipped-mostly for economic reasons-to even know that they are under probing, let alone thwart an attack. In many cases, cloud systems are caught unaware of situations where friends turn into foes, nullifying established security measures. Threats will always dwell on new (previously unknown) methods to compromise established security measures (i.e., a rat race between defenders and attackers, particularly well-resourced attackers). These methods largely fall outside the adapted models used by current security measures that protect cloud-based systems. After-the-fact analysis has driven security researchers to extend models to include assumptions about newly discovered threat(s). Solutions are then designed to deter these new threats. These models may also be generalized with additional measures mapping futuristic predictions-these are also referred to as known-unknowns.
机译:尽管当今的平均云计算环境可能在其设计和基础结构的大多数方面都包含安全性,但是仅靠网络的运行就会使其遭受攻击。典型的攻击始于探测可以利用的弱点和/或漏洞。正是在这个阶段,战斗似乎已经失败了,因为一般网络的装备不足(主要是出于经济原因),他们甚至都知道他们正在探测中,更不用说阻止了攻击。在许多情况下,云系统没有意识到朋友变成敌人的情况,从而破坏了已建立的安全措施。威胁将始终停留在新的(以前未知的)方法上,以破坏已建立的安全措施(即防御者和攻击者之间的竞争,特别是资源丰富的攻击者)。这些方法很大程度上不符合当前用于保护基于云的系统的安全措施所使用的适应模型。事后分析促使安全研究人员扩展模型,使其包含有关新发现威胁的假设。然后设计解决方案以阻止这些新威胁。这些模型也可以通过映射未来派预测的其他措施进行概括-这些也称为已知-未知。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号