Skip to main content

DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2024)

Abstract

Nowadays, the edge-cloud (EC) paradigm is adopted in several domains, including manufacturing, health, and critical infrastructure management. Identifying existing threats and vulnerabilities of an EC system and determining appropriate countermeasures is a costly and time-consuming process due to the inherent system complexity and to the heterogeneity of involved assets. Moreover, even when appropriate security measures are enforced, attacks may still succeed because of the natural degradation of security mechanisms’ effectiveness due to attackers’ reconnaissance efforts and/or to unknown vulnerabilities coming into play. This paper describes the objectives of the DEFEDGE project, which aims to define a set of techniques for the development of secure and resilient edge-cloud systems and for their assessment based on a threat-driven approach. The main idea is to leverage the results of a guided threat modeling process to derive both the security controls and the mechanisms to be enforced, as well as the security tests to perform in order to verify the effectiveness of controls in place. Security controls selection and enforcement will follow Moving Target Defense principles. Security testing will exploit existing threat intelligence and attack patterns knowledge bases to derive a set of general-purpose attack procedures that can be suitably customized to test a target system. For the generation of attack procedures and their customization, the project will also explore machine learning techniques to infer new attack patterns and scenarios, in order to improve the overall testing effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    Microsoft Inc. IoT Security. https://azure.microsoft.com/en-gb/resources/cloud-computing-dictionary/what-is-iot/security/.

  2. 2.

    Cloud Security Alliance. Top Threats to Cloud Computing: Egregious Eleven. https://cloudsecurityalliance.org/artifacts /top-threats-to-cloud-computing-egregious-eleven/.

  3. 3.

    Penetration Testing Execution Standard (PTES). http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines.

  4. 4.

    OWASP Testing project page. https://owasp.org/www-project-web-security-testing-guide/.

  5. 5.

    Pete Herzog. Osstmm 3: The open source security testing methodology manual-contemporary security testing and analysis. https://www.isecom.org/OSSTMM.3.pdf. 2010.

  6. 6.

    Penetration Testing Framework (PTS). http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html.

  7. 7.

    Mitre Corporation. Adversary Emulation Plans. https://attack.mitre.org/resources/adversary-emulation-plans/.

  8. 8.

    https://ec.europa.eu/commission/presscorner/detail/en/IP_20_2391.

References

  1. Jajodia, S., et al.: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, vol. 54. Springer, Cham (2011)

    Book  Google Scholar 

  2. Casola, V., De Benedictis, A., Albanese, M.: A multi-layer moving target defense approach for protecting resource-constrained distributed devices. In: Bouabana-Tebibel, T., Rubin, S. (eds.) Integration of Reusable Systems. Advances in Intelligent Systems and Computing, vol. 263, pp. 299–324. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04717-1_14

    Chapter  Google Scholar 

  3. Ometov, A., et al.: A survey of security in cloud, edge, and fog computing. Sensors 22(3), 927 (2022)

    Article  Google Scholar 

  4. Xiao, Y., et al.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608–1631 (2019)

    Article  Google Scholar 

  5. Ficco, M., Granata, D., Rak, M., Salzillo, G.: Threat modeling of edge-based IoT applications. In: Paiva, A.C.R., Cavalli, A.R., Ventura Martins, P., Perez-Castillo, R. (eds.) Quality of Information and Communications Technology. Communications in Computer and Information Science, vol. 1439, pp. 282-296. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-85347-1_21

  6. Cho, J.-H., et al.: Toward proactive, adaptive defense: a survey on moving target defense. IEEE Commun. Surv. Tutorials 22(1), 709–745 (2020)

    Article  Google Scholar 

  7. Navas, R.E., et al.: MTD, where art thou? A systematic review of moving target defense techniques for IoT. IEEE Internet Things J. 8(10), 7818–7832 (2020)

    Article  Google Scholar 

  8. Scarfone, K., et al.: Technical guide to information security testing and assessment. NIST Spec. Publ. 800(115), 2–25 (2008)

    Google Scholar 

  9. Knowles, W., Baron, A., McGarr, T.: The simulated security assessment ecosystem: does penetration testing need standardisation? Comput. Secur. 62, 296–316 (2016)

    Article  Google Scholar 

  10. Arkin, B., Stender, S., McGraw, G.: Software penetration testing. IEEE Secur. Priv. 3(1), 84–87 (2005)

    Article  Google Scholar 

  11. Rak, M., Salzillo, G., Granata, D.: ESSecA: an automated expert system for threat modelling and penetration testing for IoT ecosystems. Comput. Electr. Eng. 99, 107721 (2022)

    Article  Google Scholar 

  12. Lin, P.-Y., et al.: ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies. Cybersecurity 4(1), 1–15 (2021)

    Article  Google Scholar 

  13. Wang, Y., et al.: A systematic review of fuzzing based on machine learning techniques. PLoS ONE 15(8), e0237749 (2020)

    Article  Google Scholar 

  14. McKinnel, D.R., et al.: A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Comput. Electr. Eng. 75, 175–188 (2019)

    Article  Google Scholar 

  15. Confido, A., Ntagiou, E.V., Wallum, M.: Reinforcing penetration testing using AI. In: 2022 IEEE Aerospace Conference (AERO), pp. 1–15. IEEE (2022)

    Google Scholar 

  16. Jiao, J., Zhao, H., Cao, H.: Using deep learning to construct auto web penetration test. In: 2021 13th International Conference on Machine Learning and Computing, pp. 59-66 (2021)

    Google Scholar 

  17. Ghanem, M.C., Chen, T.M.: Reinforcement learning for efficient network penetration testing. Information 11(1), 6 (2019)

    Article  Google Scholar 

Download references

Acknowledgements

This work has been partially funded by the European Union - Next-GenerationEU - National Recovery and Resilience Plan (NRRP) - MISSION 4 COMPONENT 2, INVESTIMENT N. 1.1, CALL PRIN 2022 D.D. 1409 14-09-2022 - (Threat-driven security testing and proactive defense identification for edge-cloud systems). PROJECT CODE: P2022TT7A7. CUP. E53D23016380001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alessandra De Benedictis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Casola, V. et al. (2024). DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 203. Springer, Cham. https://doi.org/10.1007/978-3-031-57931-8_8

Download citation

Publish with us

Policies and ethics