Abstract

Although todays average cloud computing environment may incorporate security in most aspects of its design and infrastructure, the mere operation of the network exposes it to attacks. A typical attack starts with probing for weaknesses and/or vulnerabilities that can be exploited. And it is at this stage that the battle seems to be already lost, as the average network is insufficiently equipped-mostly for economic reasons-to even know that they are under probing, let alone thwart an attack. In many cases, cloud systems are caught unaware of situations where friends turn into foes, nullifying established security measures. Threats will always dwell on new (previously unknown) methods to compromise established security measures (i.e., a rat race between defenders and attackers, particularly well-resourced attackers). These methods largely fall outside the adapted models used by current security measures that protect cloud-based systems. After-the-fact analysis has driven security researchers to extend models to include assumptions about newly discovered threat(s). Solutions are then designed to deter these new threats. These models may also be generalized with additional measures mapping futuristic predictions-these are also referred to as known-unknowns.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.