Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems

Muhammed Mustafa Aydin, Jeremy Lawrence Jacob

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We present Cloud-COVER (Controls and Orderings for Vulnerabilities and ExposuRes), a cloud security threat modelling tool. Cloud-COVER takes input from a user about their deployment, requiring information about the data, instances, connections, their properties, and the importance of various security attributes. This input is used to analyse the relevant threats, and the way they propagate through the system. They are then presented to the user, ordered according to the security attributes they have prioritised, along with the best countermeasures to secure against the dangers listed.
Original languageEnglish
Title of host publicationIntelligence and Security Informatics Conference (EISIC), 2015 European Workshop
EditorsMohammad Hammoudeh, Liangxiu Han
PublisherIEEE
Pages53-60
Number of pages8
ISBN (Print)978-1-4799-8651-4
DOIs
Publication statusPublished - 7 Sept 2015

Cite this