Probabilistic Threat modelling

somdn_product_page

(Downloads - 0)

Catégorie :

For more info about our services contact : help@bestpfe.com

Table of contents

1 Introduction 
1.1 Problem definition
1.1.1 Research Question
1.1.2 Delimitations and scope
1.1.3 Ethics and sustainability
1.1.4 Thesis outline
2 Related work 
3 Background 
3.1 Cloud computing
3.1.1 Deployments models
3.2 Probabilistic Threat modelling
3.2.1 Mathematical formalism of the Meta attack language
3.3 The Meta attack language
3.3.1 coreLang
4 Methodology 
4.1 Domain Survey
4.1.1 Attack Lists
4.1.2 Creation of Domain-specific language
4.1.3 Evaluation
5 Domain Survey 
5.1 OpenStack
5.2 Hypervisor
5.2.1 Instances
5.3 SELinux & sVirt
5.3.1 Secure Virtualisation
6 Results 
6.1 Feature Matrix and Attack Lists
6.1.1 Feature Matrix
6.1.2 Attack and defence lists
6.2 HypervisorLang
6.2.1 coreLang
6.2.2 HypervisorLang
7 Evaluation 
7.1 Evaluation of Testcases
7.1.1 Example test case 1 – Access to Instance
7.1.2 Example test case 2 – Breakout from Instance
7.1.3 Example test case 3 – Access to host
8 Discussion 
8.1 Completness of HypervisorLang
8.2 Completness of Attack Lists and Defenses
8.3 Completeness of testing
8.4 Using MAL as a base for HypervisorLang
8.5 Regarding the works of HypervisorLang
9 Conclusion and future work 
9.1 Conclusion
9.2 Future work
Bibliography 
A Test-Cases
B Core
C HyperVisorLang
D Testmodel
D.1 TestCase1 in Result
D.2 test2
D.3 test3

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *