Redirigiendo al acceso original de articulo en 17 segundos...
ARTÍCULO
TITULO

On the Way to Automatic Exploitation of Vulnerabilities and Validation of Systems Security through Security Chaos Engineering

Sara Palacios Chavarro    
Pantaleone Nespoli    
Daniel Díaz-López and Yury Niño Roa    

Resumen

Software is behind the technological solutions that deliver many services to our society, which means that software security should not be considered a desirable feature anymore but more of a necessity. Protection of software is an endless labor that includes the improvement of security controls but also the understanding of the sources that induce incidents, which in many cases are due to bad implementation or assumptions of controls. As traditional methods may not be efficient in detecting those security assumptions, novel alternatives must be attempted. In this sense, Security Chaos Engineering (SCE) becomes an innovative methodology based on the definition of a steady state, a hypothesis, experiments, and metrics, which allow to identify failing components and ultimately protect assets under cyber risk scenarios. As an extension of a previous work, this paper presents ChaosXploit, an SCE-powered framework that employs a knowledge database, composed of attack trees, to expose vulnerabilities that exist in a software solution that has been previously defined as a target. The use of ChaosXploit may be part of a defensive security strategy to detect and correct software misconfigurations at an early stage. Finally, different experiments are described and executed to validate the feasibility of ChaosXploit in terms of auditing the security of cloud-managed services, i.e., Amazon buckets, which may be prone to misconfigurations and, consequently, targeted by potential cyberattacks.

 Artículos similares

       
 
Brent Pethers and Abubakar Bello    
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat... ver más
Revista: Future Internet

 
Indranil Roy, Reshmi Mitra, Nick Rahimi and Bidyut Gupta    
Cloud-computing capabilities have revolutionized the remote processing of exploding volumes of healthcare data. However, cloud-based analytics capabilities are saddled with a lack of context-awareness and unnecessary access latency issues as data are pro... ver más
Revista: IoT

 
Lu Han, Xiaohong Huang, Dandan Li and Yong Zhang    
In the ring-architecture-based federated learning framework, security and fairness are severely compromised when dishonest clients abort the training process after obtaining useful information. To solve the problem, we propose a Ring- architecture-based ... ver más
Revista: Future Internet

 
Yohannes Geleta, Amare Haileslassie, Belay Simane, Engdawork Assefa and Amare Bantider    
Individuals and communities use and value water in multiple and complex ways. In Sub-Saharan Africa (SSA), the pluralistic nature of water values is poorly documented, and the existing and potential value trade-offs are unidentified. This study was under... ver más
Revista: Water

 
Yuxuan Gao, Wei Xiong and Chenhao Wang    
Dam operation is regarded as an effective way to increase water, food, and energy security for society. However, with the increasing water demand and frequent extreme droughts, numerous rivers worldwide go through periods of water scarcity and water ecos... ver más
Revista: Water