PhD Oral Exam - Nawaf Alhebaishi, Information and Systems Engineering
Threat Modeling for Cloud and NFV Infrastructures
This event is free
School of Graduate Studies
When studying for a doctoral degree (PhD), candidates submit a thesis that provides a critical review of the current state of knowledge of the thesis subject as well as the student’s own contributions to the subject. The distinguishing criterion of doctoral graduate research is a significant and original contribution to knowledge.
Once accepted, the candidate presents the thesis orally. This oral exam is open to the public.
Today’s businesses are increasingly relying on the cloud as an alternative IT solution due to its flexibility and lower cost. Compared to traditional enterprise networks, a cloud infrastructure is typically much larger and more complex. Understanding the potential security threats in such infrastructures is naturally more challenging than in traditional networks. This is evidenced by the fact that there are limited efforts on threat modeling for cloud infrastructures. My doctoral research will tackle several issues related to this.
In the first topic, we have conducted comprehensive threat modeling exercises based on two representative cloud infrastructures using several popular threat modeling methods, including attack surface, attack trees, attack graphs, and security metrics based on attack trees and attack graphs, respectively. In addition, we show how hardening solution can be applied based on the threat models and security metrics through extended exercises. Such results may not only benefit the cloud provider but also embed more confidence in cloud tenants by providing them a clearer picture of the potential threats and mitigation solutions.
In the second topic, we take the first step towards understanding and mitigating the insider threats of remote administrators in clouds. First, we model the maintenance task assignments and their corresponding security impact due to privilege escalation. Second, we mitigate such impact through optimizing the task assignments with respect to given constraints. Finally, the simulation results demonstrate the effectiveness of our solution in various scenarios.
In the third topic, we focus on modeling and mitigating security threats unique to network functions virtualization (NFV), which provides virtualization of network functions based on cloud infrastructures. First, we model both cross-layer and co-residency attacks on the NFV stack. Second, we mitigate such threats through optimizing the virtual machine (VM) placement with respect to given constraints. The simulation results demonstrate the effectiveness of our solution.