Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.

Slides:



Advertisements
Similar presentations
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Lecture 1: Overview modified from slides of Lawrie Brown.
Hey, You, Get Off of My Cloud
Security Issues and Challenges in Cloud Computing
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Bharat Bhargava Computer Science Purdue University Research in Cloud Computing YounSun Cho Computer Science Purdue.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
CLOUD PRIVACY AND SECURITY CS 595 LECTURE 15 4/15/2015.
Introduction (Pendahuluan)  Information Security.
Authors: Thomas Ristenpart, et at.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2013 Lecture 3 09/03/2013 Security and Privacy in Cloud Computing.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
Storage Security and Management: Security Framework
Architecting secure software systems
Cryptography and Network Security
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Operating system Security By Murtaza K. Madraswala.
Network security Network security. Look at the surroundings before you leap.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 Commonwealth Security Information Resource Center Michael Watson Security Incident Management Director 10/17/2008
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Cryptography and Network Security Sixth Edition by William Stallings.
Ingredients of Security
Network Security Introduction
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Network security Vlasov Illia
CS457 Introduction to Information Security Systems
Mapping/Topology attacks on Virtual Machines
BUILD SECURE PRODUCTS AND SERVICES
Threat Modeling for Cloud Computing
Lecture 20: Cloud Security
CS 395: Topics in Computer Security
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Off-line Risk Assessment of Cloud Service Provider
Information and Network Security
Presentation transcript:

Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1

Threats, vulnerabilities, and enemies 2 Goal Learn the cloud computing threat model by examining the assets, vulnerabilities, entry points, and actors in a cloud Technique Apply different threat modeling schemes

Threat Model A threat model helps in analyzing a security problem, design mitigation strategies, and evaluate solutions Steps: Identify attackers, assets, threats and other components Rank the threats Choose mitigation strategies Build solutions based on the strategies 3

Threat Model Basic components  Assets / potentially attacked targets  Attacker modeling Choose what attacker to consider Attacker motivation and capabilities  Vulnerabilities / threats 4

Recall: Cloud Computing Stack 5

Recall: Cloud Architecture 6 Client SaaS / PaaS Provider Cloud Provider (IaaS)

Assets – targets under attack 7

Assets  Confidentiality: Data stored in the cloud Configuration of VMs running on the cloud Identity of the cloud users Location of the VMs running client code 8

Assets  Integrity Data stored in the cloud Computations performed on the cloud 9

Assets  Availability Cloud infrastructure SaaS / PaaS 10

Attackers 11

Who is the attacker? 12 Insider? Malicious employees at client Malicious employees at Cloud provider Cloud provider itself Outsider? Intruders Network attackers?

Attacker Capability: Malicious Insiders  At client Learn passwords/authentication information Gain control of the VMs  At cloud provider Log client communication 13

Attacker Capability: Cloud Provider  What can the attacker do? Can read unencrypted data Can possibly peek into VMs, or make copies of VMs Can monitor network communication, application patterns 14

Attacker motivation: Cloud Provider  Why? Gain information about client data Gain information on client behavior Use the information to improve services Sell the information to gain financial benefits 15

Attacker Capability: Outside attacker  What can the attacker do? Listen to network traffic (passive) Insert malicious traffic (active) Probe cloud structure (active) Launch DoS 16

Attacker goals: Outside attackers  Intrusion  Network analysis (network security)  Man in the middle: public key example  Cartography: making map (original meaning), inference based on linked events/objects 17 AMB Req. pk_B Ret. Pk_B Ret. Pk_B’ AMB Pk_B’(m)Pk_B(m’) Pk_A’(r) Pk_A(r’) Pk_A: public key by A Pk_B: public key by B Pk_A’,Pk_B’: false public keys by M

Threats – methods doing attacks 18

Organizing the threats using STRIDE  Spoofing identity  Tampering with data  Repudiation (refuse to do with, dispute)  Information disclosure  Denial of service  Escalation of privilege 19

Spoofing identity  illegally obtaining access and use of another person’s authentication information Man in the middle URL phishing address spoofing ( spam) 20

Tampering with data  Malicious modification of the data  Often hard and costly to detect you might not find the modified data until some time has passed; once you find one tampered item, you’ll have to thoroughly check all the other data on your systems 21

Repudiation  a legitimate transaction will be disowned by one of the participants You sign a document first; and refused to confirm the signature Need a trusted third party to mitigate 22

Information/data disclosure  an attacker can gain access, without permission, to data that the owner doesn’t want him or her to have. 23

Denial of service  an explicit attempt to prevent legitimate users from using a service or system. It involves the overuse of legitimate resources.  You can stop all such attacks by removing the resource used by the attacker, but then real users can’t use the resource either. 24

Escalation of privilege  an unprivileged user gains privileged access. E.g. unprivileged user who contrives a way to be added to the Administrators group 25

Mitigation techniques 26

Typical threats (contd.) 27

Threat tree: a thread analysis and modeling method 28