Toward Automated Security Analysis and Enforcement For Cloud Computing Using Graphical Models For Security
Toward Automated Security Analysis and Enforcement For Cloud Computing Using Graphical Models For Security
ABSTRACT Cloud computing has become widely adopted by businesses for hosting applications with
improved performance at a fraction of the operational costs and complexity. The rise of cloud applications
has been coupled with an increase in security threat vectors and vulnerabilities. In this paper, we propose
a new security assessment and enforcement tool for the cloud named CloudSafe, which provides an
automated security assessment and enforce best security control for the cloud by collating various
security tools. To demonstrate the applicability and usability of CloudSafe, we implemented CloudSafe
and conducted security assessment in Amazon AWS. Also, we analyzed four different security
countermeasure options in depth; Vulnerability Patching, Virtual Patching, Network Hardening and
Moving Target Defence. Virtual Patching, Network Hardening and Moving Target Defence were
determined to be feasible with regards to deployment implementation for the project. Proof of concepts
were developed demonstrating the effectiveness of each feasible countermeasure option. These results
indicate that the proposed tool CloudSafe is effective and efficient in helping security administrators to
select optimal countermeasures to secure their cloud by conducting an in-depth security assessment.
INDEX TERMS Cloud computing, cloud security, graphical security models, security assessment.
I. INTRODUCTION
These models provide the framework to collect security
Cloud computing provides many beneficial factors over the
data and evaluate various attack scenarios of the network,
traditional networks, which enhance the productivity and
as well as the capabilities to incorporate countermeasure
performance of enterprises and individuals [1], [2]. But at
selections. However, automating the functionalities of those
the same time, it faces many security challenges and
models in the cloud can be challenging, as the privilege
threats, affecting the decisions of using cloud computing
boundaries are more complex than the traditional networks.
services significantly [3]. That is, potential cloud users need
Currently, much of the security analysis for the cloud is
to consider various security implications before migrating
done manually by a security expert due to the complexity of
their data and operations to the cloud computing
enabling automation. In the manual process, however, a lot
environment [4]. Although there are various security
of time is consumed and it can also introduce human errors.
mechanisms imple- mented for the cloud, their
Hence, automation is essential to reduce cost and time, as
effectiveness must be evaluated to fully understand the
well as reducing human errors. There are many tools
security posture of the cloud. One of the widely used
available for assessing the security of networks [6]. For
techniques is to develop a security assess- ment framework
example, NAVIGATOR [7], MulVAL [8], and NICE [9] all
using graphical security models [5], [6].
have functions to automatically assess the security of
The associate editor coordinating the review of this manuscript and networks. However, these tools require specific security
approving it for publication was Ali Kashif Bashir . details of the network, which may not be collectable in
the cloud
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 10, 2022 75117
S. An et al.: Toward Automated Security Analysis and Enforcement for Cloud Computing
due to privilege boundaries. Security information gathering attack graph. Noel et al. [15] proposed a scalable
tools, such as NESSUS [10] and National Vulnerability modeling frame- work to create a predictive model for
Database (NVD) [11], are easily deployed in traditional possible multi-step
networks as typically the whole network is under the
system administrator’s control. However, the cloud
separates the privilege between different stakeholders (e.g.,
clients and service providers), limiting the access to security
information that existing information gathering tools can
access to. Hence, additional measures are needed to ensure
that all this information can be collected automatically to
evaluate the security of the cloud.
To address the aforementioned problems, our main
motiva- tion is to propose an automated cloud-based
security analysis framework named CloudSafe to evaluate
the security of the cloud. In cloud computing, access to
security information by existing security information
collection tools is limited. For that reason, we developed a
framework that can automatically collect information about
cloud computing and perform security assessments. We
present additional techniques to collect security information
from the cloud, which is then stored in a database. For
example, we used Security Group (SG), which is basic
security method of AWS, to collect reachability. As the
security assessment framework in the CloudSafe, we
implement a scalable graphical security model named
Hierarchical Attack Representation Model (HARM) [12].
We further modify the functionalities of the HARM such
that it will integrate with the security data gathering
interfaces we implemented for the CloudSafe. Our prior
work was published in [13], but we have substantially
extended the previous work as follows:
• We incorporated more security countermeasure
approaches into our framework and evaluated their
effectiveness;
• We proposed optimal security countermeasure deploy-
ment strategy in the cloud with multiple
countermeasure selection options (i.e., multi variable
optimization);
• We proposed a novel framework CloudSafe that
extends its features to deploy optimal security
countermeasures in the cloud; and
• We experimented various security countermeasure
selection scenarios in real-world cloud based on AWS.
The rest of the paper is structured as follows. Section II
describes the related work on security assessment for the
cloud. Section III presents the CloudSafe framework with
details on its architecture, configurations and workflow.
Section IV shows the results of using the CloudSafe in the
Amazon AWS. Finally, we conclude the paper in Section
V.
any type of software or operating system. Additionally, countermea- sures exist. However, most work focuses
non- patchable vulnerabilities are not addressed in this on evaluating their effectiveness and optimizing for
paper. greatest security benefit.
Shameli-Sendi et al. [21] proposed a dynamic framework
for optimal countermeasure selection for intrusion response
systems. The framework uses a multi-objective
optimization concept to maximize security benefit, while
minimizing the impact on users, services and deployment
costs. The frame- work builds on top of Intrusion Detection
Systems (IDS) that detect exploits in a network, as a
Intrusion Response Sys- tem (IRS) that protects a
compromised network by selecting appropriate security
countermeasures. From this perspective, CloudSafe is a
Intrusion Prevention System (IPS) that actively assesses the
security posture of the network and selects security
countermeasures to protect it. Firstly, in terms of this project,
their work confirms that vulnerability patching and network
traffic management (essentially host isolation) are the most
effective security countermeasures in terms of maximizing
security benefit while minimizing impact on users
deployment costs. Secondly, much of the paper focuses on
the multi-objective optimization problem to select the most
optimal countermeasure which is out of scope of this
project proposal, but can assist in improving CloudSafe in
the future.
Patil and Modi [22] designed a framework for
vulnerability assessment and patching in cloud computing
environments. Their work is very relevant to this project
proposal with much of the assessment framework being
comparable to CloudSafe’s framework. However there are
two issues with the paper. Firstly, it is assumed that the new
joining of VMs is the only source of introducing
vulnerabilities which is inaccurate. Secondly, it is
acknowledged that non-patchable vulnerabilities are not
mitigated, as vulnerability patching is the only security
countermeasure employed. They deal with this problem by
simply marking unpatched VMs as high risk and
continuously monitoring them. However CloudSafe aims to
provide countermeasures for both patchable vulnerabilities
and non-patchable vulnerabilities to minimize risk.
A significant amount of literature on security
9584 VOLUME 10, 2022
S. An et al.: Toward Automated Security Analysis and Enforcement for Cloud Computing
III. CLOUDSAFE
The details of CloudSafe tool is presented in this section.
CloudSafe follows the SaaS (Software-as-a-Service) frame-
work that can perform cloud security analysis (i.e. a cloud
service for cloud security). Figure 1 shows the overall process
of the CloudSafe framework. The proposed framework is
implemented in the Amazon AWS (AWS for short), and it
consists of two phases. Phase 1 collects information about the
target cloud and stores the data used for the security analysis in
a database. Then, the security is evaluated using the HARM
(Hierarchical Attack Representation Model). HARM is a
security assessment model that can evaluate the security
posture of systems and networks against targeted attacks and
denial of service attacks. Phase 2 generates and stores a new
HARM model by modifying the security information collected
in Phase 1. In this way it can be seen if the security posture of
the cloud changes without changing the actual cloud
configurations.
A. PHASE 1
Reachability of the cloud components in the security analysis
is essential information (e.g., the reachability of different
virtual machines (VMs)). There are various tools for this
purpose, but it is difficult to apply them in the cloud, because
the assessment tool may not have enough privileges to access
such information. To solve this problem, we obtained
Reachability using Security Group (SG), which is the basic
security method of AWS. The SG controls access using IP and
Port as packet filtering. The SG information is used to generate
the Reachability Graph (RG) by considering only the allowed
rules for inbound traffics. Figure 2 shows the process of
acquiring the reachability information from the target cloud
(i.e., the cloud environment to conduct security assessment)
and storing it in the Network Database (NDB)
C. PHASE 3
1) SECURITY COUNTERMEASURE ANALYSIS
A.IMPACTS OF THE CLOUD
Prior to selecting possible security countermeasures, the
impacts of using the cloud on cyber security need to be
taken into consideration. The differences between cloud and
traditional networks affect which security countermeasures
may be used and how they are deployed. Despite
differences between cloud providers, this analysis will
focus on how AWS offers their cloud services. The primary
impacts of the cloud to cyber security include:
• No access to physical infrastructure
• Differences in traditional and cloud networking
• Dynamic nature of the cloud
• Virtual machines consistently start and terminate on-
demand
A key implication of migrating to the cloud means
that cloud users have no access to physical infrastructure.
FIGURE 6. DB schema. As a result, physically installing security solutions are
not possible, for example, physical firewalls and network
monitors. Additionally, to optimize the benefits of using
B. PHASE 2 the cloud, cloud users dynamically adjust their workloads
to adapt to changing requirements and demands such as
In order to improve the security of the cloud, we can deploy
increases in network traffic. This introduces the dynamic
security solutions based on the security assessment of the
nature of the cloud, in which virtual machines consistently
cloud we generated from Phase 1. However, it takes many
start and terminate on-demand. As a result, the security
resources to perform these tasks. Consequently, the service
attack surface and thus security posture of a target cloud
can also be stopped in the process. To solve this problem
regularly changes over time. In terms of security, security
and test the security of the cloud, we propose Phase 2 that
assessment methods need to take into account the temporal
can create a new security model of the cloud by modifying
and diverse nature of cloud attack surfaces. Furthermore,
the HARM configuration that was previously stored in the
security countermeasures and their behaviour in the cloud
DB and evaluate their effectivenesses.
need to be considered.
Figure 7 shows the whole process of Phase 2. In this
phase, NDB, HDB, and VDB are modified and saved in the
B.COUNTERMEASURE TYPES
DB. As a result, a new HARM model is generated, and the
security analysis result of the new HARM model is Security countermeasures are a highly researched field,
provided to the user with a comparison report with the with a wide variety of solutions documented for all types
original HARM model generated in Phase 1. Phase 2 works of vulnerabilities. A security countermeasure is generally
recursively to change the cloud configurations in a direction deployed to mitigate the risk from a single vulnerability.
that gradually
9590 VOLUME 10, 2022
S. An et al.: Toward Automated Security Analysis and Enforcement for Cloud Computing
were changed consistently over the course of the project for 3306 for
testing.
Table 5(a) displays the raw results of running the auto-
mated scanning program on the initial testbed environment
within AWS. These results are used as a benchmark
for evaluating security countermeasure effectiveness later.
As determined from the program, the accumulative risk for
the initial testbed is 268.53, with a total of 28
vulnerabilities within the whole system. The accumulative
risk is calculated from all vulnerabilities found on all hosts.
As such, the risk value from a specific vulnerability present
on multiple hosts will be higher in the end. This is
reasonable as a vulnerability found throughout an entire
system is arguably higher risk than a vulnerability only on a
specific host, as the likelihood of vulnerability exploitation
is multiplied. For simplification purposes, attack surface
and attack path calculation are not conducted within this
project. From the host summary, the host type can be
identified from the vulnerable ports. The database instance
has port 3306 exposed, the application instance has port
9200 exposed, and web server instances have all ports
exposed by the security group ingress rules.
E.VULNERABILITY PATCHING
Vulnerability patching is the action of applying patches or
fixes to vulnerable hosts or their affected software. There
are numerous types of patching that can be applied to hosts
as it is a relatively general term. Examples include updating
software, changing operating system versions, installing
security bug fixes, or changing software configuration.
Vulnerability patching is a host level security control that
addresses the vulnerability directly.
The security control generally resolves a vulnerability
completely and mitigates its risk from all affected hosts.
If applied, the countermeasure can reduce the possible
attack paths within the network by blocking attackers from
hosts deeper within the network. As a result, the overall
security posture should improve significantly after
implementing vulnerability patching. On the other hand,
patching directly on hosts may result in service downtime
which may lead to further costs. Downtime can be avoided
depending on the deployment method, however.
Additionally, a singular patch may only be valid for a
specific vulnerability on specific software versions,
operating systems, and further dependencies.
F.VIRTUAL PATCHING
Virtual patching is the action of virtually applying a patch
to a vulnerability on a host directly. Various methods may
be implemented to achieve virtual patching, however, they
should have the same effect on the host. Virtual patching
leaves alone the affected software and manipulates the host
in such a way that the vulnerable software is unreachable.
Virtual patching is a host level security control that
addresses the vulnerability directly.
An example includes disabling the port on a host
associated with a vulnerable software (e.g., closing port
VOLUME 10, 2022 9595
S. An et al.: Toward Automated Security Analysis and Enforcement for Cloud Computing
G.NETWORK HARDENING
Network hardening is the process of locking down exposed
ports within the networking abstraction of the cloud. As such it
is very similar to virtual patching in terms of its behaviour of
allowing vulnerable software to exist, but denying access to it.
Network hardening is usually a method for ensuring best
security practices within cloud environments, but can also be
deployed as a countermeasure to a newly discovered
vulnerability. Network Hardening is a network level security
control that manipulates the networking within the cloud and
does not affect hosts directly. In AWS, this include Network
Access Control List (NACL) manipulations, and Security
Group (SG) manipulations. NACLs and SGs have essentially
the same behavior, however, the implications to networking
between hosts are different. For the purposes of the project,
Security Groups will be focussed on. Similarly to virtual
patching, host hardening can mitigate risk completely and is a
good short-term solution until a vendor fix is available.
Using security groups, which provide granular control over
ingress traffic to instances, a system administrator can lock
down access to certain ports to certain IP address ranges using
CIDR blocks. By doing this, services can be accessed only
from trusted IP ranges, significantly reducing the risk of
attackers being able to exploit any vulnerabilities. Assessing
the security posture of the environment after doing so is more
difficult as attackers may use IP spoofing or other techniques
to overcome this.
Advanced Persistent Threats (APTs) that require time and example, Ansible can automatically
planning to coordinate and launch [26].
A.VIRTUAL PATCHING
To deploy virtual patching, an ansible script was created to
programmatically disable a vulnerable port on all specified
hosts automatically. The ansible script has the following
requirements:
• Anisble
• Python
• SSH access to targets - Private Key
• AWS API Permissions
• AWS SDK (boto3)
The inputs to the ansible script include: created to programmatically change the public IPs of
• Port to disable each
• Security Group of instances to apply virtual patching
to The simplified steps of the ansible script are as follows:
1) Parse inputs
2) Using AWS API calls -> determine all instances
and their IPs within the security groups inputted
3) SSH into each instance using private key defined in
ansible configuration
4) Using iptables module -> create rule to drop
packets
incoming from inputted port on each instance
The ansible script can be initiated using the command
line with a single simple command. This implementation
is a proof of concept that programmatically applies virtual
patching to a set of hosts. Although the inputs are provided
manually by a local configuration file, they can be inputted
programmatically and integrated with output from phase
1. Additionally, the method of defining which hosts to
apply virtual patching to can be modified to provide better
flexibility for the security countermeasure option.
B.NETWORK HARDENING
To deploy networking hardening a python program was
created to programmatically manipulate Security Groups to
lock down vulnerable ports and deny access. Due to the
difficulties on implementing a security group manipulation
solution stated in the analysis prior, this implementation is a
proof of concept only and requires further development.
The python program requirements include:
• Python
• AWS SDK
• AWS API permissions
The inputs to the python program are:
• Host summary output from automated scanning
program The steps of the python program are as follows:
• From the host summary -> Parse each host’s
vulnerable ports
• Using AWS API -> Retrieve all ingress rules within
each instance’s security groups
• Map each host’s vulnerable port to any and all ingress
rules they match and are associated with
• Iterate through all ingress rules have that vulnerable
ports and revoke using AWS API call
A key problem met when developing this solution was the
need to map each host’s vulnerable ports to all ingress rules
they matched and are associated with programmatically.
The issue was that instance may have multiple Security
Groups, and Security Groups may have multiple ingress
rules, that may have port ranges, and rules that overlapped.
The program needed to identify all vulnerable ingress rules
and revoke them. This was solved by individually iterating
through each instance and it’s security group ingress rules
and determine any vulnerable ingress rule and storing that
within a mapping.
mentations
of network hardening the security group of the web server is out of scope.
instances will be locked down to only expose ports 22, 80
and 443 (standard web server ports). Looking at the host
summary of the initial testbed environment, the web server
instances have a several vulnerable ports contributing
significantly to the accumulative risk. Conducting this
network hardening should reduce the sum risk of the
environment greatly. The steps for testing in AWS are as
follows:
1) Access AWS console
2) Navigate to the web server security group
3) Remove the unnecessary ingress traffic rules
4) Add ingress from any IP address for TCP ports 22,
80 and 443
Assessing the security posture of the new cloud
environment provided in Table 5(d) confirms that network
hardening successfully resolves the risk from any locked
down port completely. The results of the security posture
assessment display a accumulative risk of 59.29, a major
reduction from
268.53 initially. Examining the host summary consolidates
the statements made prior, as the web server instances only
have one vulnerable port
Requirements: To implement network hardening as a
security countermeasure for Phase 3, the only requirement
is access to AWS credentials and AWS API permissions.
Methods: As mentioned briefly previously, the two
methods to implementing network hardening in AWS are
though NACL manipulation or SG manipulation. Security
Group manipulation can be performed either manually in
the AWS console, a program using AWS Software
Development Kit (SDK) or through a script using AWS
Command Line Tool (CLI).
Difficulties: The difficulties regarding implementing a
network hardening solution include:
• Systems with complex network topologies will
increase difficulty exponentially
• Required services and their exposed ports need to be
understood
• Security Group rules may be implemented differently
for different applications/systems
• Vulnerable ports may be allowed by multiple ingress
rules in multiple security groups
• Ingress rules may contain port ranges - changes need
to preserve those ranges
Feasibility: Although there are several difficulties and
nuances regarding a solution for network hardening, the
design and implementation of a proof of concept using the
AWS SDK is within the scope of the project.
D. OVERHEAD
To understand the performance overhead using CloudSafe, we
measure the time take in Phase 1. The time taken using the
CloudSafe tool on testbed 1 was measured and the mean value
was used from 10 measurements. Table 4 shows the overhead
of gathering the data to populate the DBs. It shows that most
tasks can be completed reasonably quickly (within a matter of
a few seconds), while the biggest bottleneck is the
vulnerability scanning of VMs. One approach to improve the
vulnerability scanning time is to reduce the port range to scan,
but vulnerabilities outside the measurement range would not
be included in the analysis. Another approach is to parallelize
the vulnerability scanning using the cloud, which we will
investigate in our future work.
Next, we measure the computational overhead using
CloudSafe. The use of the vulnerability analysis tools is
the only factor that affects the VM when using CloudSafe.
Figure 14 shows the load on the CPU and the network of the
VMs when using CloudSafe. All TCP/IP ports were scanned
and the load was measured in 1-minute increments. During the
measurement, CPU usage increased by up to 11 percent, and
the network had a maximum input of 5,042 bytes per minute
and an output of 416 bytes. During the tool usage period, the
cumulative input was 11,163 bytes and the output was 1,234
bytes. Network load was not large, but the CPU utilization
increased significantly. There is a need to adjust the scan
options depending on the host’s CPU performance or the role.
On the other hand, disk reads and writes were almost
unchanged.
V. CONCLUSION
Evaluating the security of the cloud can be a challenging
task due to the scalability and dynamic nature, as well as
the different privilege boundaries between the stakeholders
(e.g., cloud service providers and clients). To address
these problems, we proposed a framework to evaluate the
security of the cloud using CloudSafe. CloudSafe provides
semi-automated functions to collect and store the security
information from the cloud, and also provide functions
to modify the cloud configurations and compare how the
security posture changes in the cloud. The results show that
without too much user interventions, CloudSafe can collect
security data from the cloud, evaluate the security posture
of the cloud using the HARM, and generate reports that
the user can utilize to assess the security of the cloud.
Further, different countermeasures can be pre-evaluated
prior to their deployment using CloudSafe to compare
changes in the security posture of the cloud. However, in
this paper, we experimented with an arbitrarily constructed
cloud model. It needs to be applied to an actual cloud REFERENCES
computing system. Therefore, we plan to expand it so [1] P. Mell and T. Grance, The Nist Definition of Cloud Computing, vol. 800.
Gaithersburg, MD, USA: NIST Special, 2011, p. 145.
that it can be applied not only to AWS but also to various [2] M. Banikazemi, D. Olshefski, A. Shaikh, J. Tracey, and G. Wang,
clouds such as Azure. In addition, we plan to study zero- ‘‘Meridian: An SDN platform for cloud network services,’’ IEEE Commun.
day attack detection using anomaly detection. Mag., vol. 51, no. 2, pp. 120–127, Feb. 2013.
[3] J. B. Hong, A. Nhlabatsi, D. S. Kim, A. Hussein, N. Fetais, and K. M.
Khan, ‘‘Systematic identification of threats in the cloud: A survey,’’
Comput. Netw., vol. 150, pp. 46–69, Feb. 2019.
APPENDIX [4] D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman, and D. Woods,
Table 5 shows the AWS resources and service versions ‘‘Cloud-trust—A security assessment model for infrastructure as a service
used to set up the testbeds. Each instance had one vCPU (IaaS) clouds,’’ IEEE Trans. Cloud Comput., vol. 5, no. 3, pp. 523–536,
Jul. 2015.
and 1GiB of memory. Table 6 shows the AWS resources [5] B. Kordy, L. Piètre-Cambacédès, and P. Schweitzer, ‘‘DAG-based attack
used by the CloudSafe tool (WS refers to Windows Server). and defense modeling: Don’t miss the forest for the attack trees,’’
The type of those instances was all t2.micro. Table 7 shows Comput. Sci. Rev., vol. 13, pp. 1–38, Nov. 2014.
the scanned vulnerabilities in each AMI from the target
cloud.
VOLUME 10, 2022 9609
S. An et al.: Toward Automated Security Analysis and Enforcement for Cloud Computing
[6] J. B. Hong, D. S. Kim, C.-J. Chung, and D. Huang, ‘‘A survey on the
[18] H. H. Song, ‘‘Testing and evaluation system for cloud
usability and practical applications of graphical security models,’’
Comput. Sci. Rev., vol. 26, pp. 1–16, Nov. 2017. computing information security products,’’ Proc. Comput. Sci.,
vol. 166, pp. 84–87, Jan. 2020. [Online]. Available: https://www.
[7] M. Chu, K. Ingols, R. Lippmann, S. Webster, and S. Boyer, ‘‘Visualizing
sciencedirect.com/science/article/pii/S1877050920301459
attack graphs, reachability, and trust relationships with NAVIGATOR,’’
[19] S. Preda, F. Cuppens, N. Cuppens-Boulahia, J. Garcia-Alfaro, and
in Proc. 7th Int. Symp. Vis. Cyber Secur. (VizSec), 2010, pp. 22–33.
[8] X. Ou, S. Govindavajhala, and A. W. Appel, ‘‘MulVAL: A logic-based L. Toutain, ‘‘Dynamic deployment of context-aware access control
network security analyzer,’’ in Proc. USENIX Secur. Symp., Baltimore, policies for constrained security devices,’’ J. Syst. Softw., vol. 84, no. 7,
MD, USA, vol. 8, 2005, pp. 113–128. pp. 1144–1159, Jul. 2011.
[9] C. J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, ‘‘NICE: [20] H. Kawashiro and M. Asano. (Jan. 2012). Web Vulnerability
Network intrusion detection and countermeasure selection in virtual Patching Device, Web Server, Web Vulnerability Patching Method,
network systems,’’ IEEE Trans. Dependable Secure Comput., vol. 10, and Programming. [Online]. Available: https://worldwide.espacenet.
no. 4, pp. 198–211, Jul. 2013. com/publicationDetails/biblio?FT=D&date=20120126&DB=EPODOC&
[10] J. Beale, R. Deraison, H. Meer, R. Temmingh, and C. Walt. (2002). locale=&CC=WO&NR=2012011270A1
The Nessus Project. Syn-Gress Publishing. [Online]. Available: [21] A. Shameli-Sendi, H. Louafi, W. He, and M. Cheriet, ‘‘Dynamic
http://www.nessus.org optimal countermeasure selection for intrusion response system,’’ IEEE
[11] N. I. of Standards and Technology. The National Vulnerability Database. Trans. Dependable Secure Comput., vol. 15, no. 5, pp. 755–770,
[Online]. Available: https://nvd.nist.gov/ Sep. 2018.
[12] J. B. Hong and D. S. Kim, ‘‘Towards scalable security analysis using [22] R. Patil and C. Modi, ‘‘Designing an efficient framework for vulnerability
multi- layered security models,’’ J. Netw. Comput. Appl., vol. 75, pp. assessment and patching (VAP) in virtual environment of cloud comput-
156–168, Nov. 2016. ing,’’ J. Supercomput., vol. 75, no. 5, pp. 2862–2889, Nov. 2018.
[13] S. An, T. Eom, J. S. Park, J. B. Hong, A. Nhlabatsi, N. Fetais, K. M. [23] K. Kritikos, K. Magoutis, M. Papoutsakis, and S. Ioannidis, ‘‘A survey on
Khan, and D. S. Kim, ‘‘CloudSafe: A tool for an automated security vulnerability assessment tools and databases for cloud-based web applica-
analysis for cloud computing,’’ in Proc. 18th IEEE Int. Conf. Trust, tions,’’ Array, vols. 3-4, Sep. 2019, Art. no. 100011. [Online]. Available:
Secur. Privacy Comput. Commun., 13th IEEE Int. Conf. Big Data Sci. https://www.sciencedirect.com/science/article/pii/S2590005619300116
Eng. (TrustCom/BigDataSE), Oct. 2019, pp. 602–609. [24] R. Patil and C. Modi, ‘‘An exhaustive survey on security concerns and
[14] S. Bleikertz, M. Schunter, C. W. Probst, D. Pendarakis, and K. Eriksson, solutions at different components of virtualization,’’ ACM Comput. Surv.,
‘‘Security audits of multi-tier virtual infrastructures in public vol. 52, no. 1, pp. 1–38, Feb. 2019, doi: 10.1145/3287306.
infrastructure clouds,’’ in Proc. ACM Workshop Cloud Comput. Secur. [25] S. Ullman, S. Samtani, B. Lazarine, H. Zhu, B. Ampel, M. Patton, and
Workshop (CCSW), 2010, pp. 93–102. H. Chen, ‘‘Smart vulnerability assessment for scientific cyberinfrastruc-
[15] S. Noel, E. Harley, K. H. Tam, M. Limiero, and M. Share, ‘‘CyGraph: ture: An unsupervised graph embedding approach,’’ in Proc. IEEE Int.
Graph-based analytics and visualization for cybersecurity,’’ in Handbook Conf. Intell. Secur. Informat. (ISI), Nov. 2020, pp. 1–6.
of Statistics, vol. 35. Amsterdam, The Netherlands: Elsevier, 2016, [26] S. Jajodia, A. K. Ghosh, V. Subrahmanian, V. Swarup, C. Wang, and
pp. 117–167. X. S. Wang, Moving Target Defense II Application of Game Theory
[16] S. Rizvi, J. Ryoo, J. Kissell, W. Aiken, and Y. Liu, ‘‘A security and Adversarial Modeling (Advances in Information Security), 1st ed.,
evaluation framework for cloud security auditing,’’ J. Supercomput., vol. S. Jajodia, A. K. Ghosh, V. S. Subrahmanian, V. Swarup, C. Wang, and
74, no. 11, X. S. Wang, Eds. New York, NY, USA: Springer, 2013.
pp. 5774–5796, Nov. 2018. [27] J. B. Hong, D. S. Kim, and A. Haqiq, ‘‘What vulnerability do we need to
[17] S. Manzoor, H. Zhang, and N. Suri, ‘‘Threat modeling and analysis for patch first?’’ in Proc. 44th Annu. IEEE/IFIP Int. Conf. Dependable Syst.
the cloud ecosystem,’’ in Proc. IEEE Int. Conf. Cloud Eng. (ICE), Apr. Netw., Jun. 2014, pp. 684–689.
2018,
pp. 278–281.