An attack graph-based method for automatic generation of cloud outsourcing service data leakage security test cases

A technology of security testing and outsourcing data, applied in the field of cloud computing security, can solve problems such as leak test case automation, achieve the effect of ensuring comprehensiveness and improving construction efficiency

Active Publication Date: 2021-09-24
BEIJING UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention intends to solve the problem of automatic generation of test cases in the cloud outsourcing service data leakage security scenario

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An attack graph-based method for automatic generation of cloud outsourcing service data leakage security test cases
  • An attack graph-based method for automatic generation of cloud outsourcing service data leakage security test cases
  • An attack graph-based method for automatic generation of cloud outsourcing service data leakage security test cases

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0091] The present invention mainly uses DCSP to deploy Hadoop distributed data service clusters in OpenStack cloud platform virtual machines as an example to illustrate the execution process of the automatic generation method of cloud outsourcing service data leakage security test cases based on attack graph, but is not limited to deploying distributed data on other cloud platforms. big data service platform. Specific steps are as follows:

[0092] 1. A method for generating data leakage detection indicators in the life cycle of cloud outsourcing data services based on data flow analysis. The specific implementation steps are:

[0093] First of all, analyze the key points of data flow, data location, attacked object and attack role in this scenario, and realize the automatic construction of cloud outsourcing data service data leakage detectio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attack graph-based automatic generation method of cloud outsourcing service data leakage security test cases, a method for generating data leakage detection indicators covering the life cycle of cloud outsourcing data services based on data flow analysis; and an attack tree model based on data leakage attack objects Automatic construction of the attack graph; automatic generation of XML security test cases based on the attack graph and XML security test description language; automatic generation of security test scripts based on templates; data leakage threats covering the life cycle of cloud outsourcing data services based on data flow analysis in the present invention, automatic Construct a data leakage security index system in the cloud platform outsourcing data service scenario; build an attack tree and attack graph based on the data leakage attack point attack tree model to improve the efficiency of attack detection; propose an XML-based security test description language to automatically generate executable security test cases script.

Description

technical field [0001] The invention relates to a method for generating a security test case, in particular to an attack graph-based automatic generation method for a cloud outsourcing service data leakage security test case, belonging to the field of cloud computing security. Background technique [0002] Elastic computing services provided by cloud computing service providers can provide technical support for the rapid generation and batch analysis of big data, and the combination with big data has become the mainstream of current development. Cloud users can easily and directly choose cloud outsourcing services for data processing. However, the combination of the two also brings new opportunities and challenges to cloud data security. [0003] The current mainstream cloud service providers (Cloud Service Provider, CSP, also known as cloud service provider) mainly provide cloud users (CloudTenant, CT, also known as cloud tenants) with IaaS and PaaS through computing, netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1408H04L63/1416H04L67/10
Inventor 樊旭东詹静赵勇高雅琪韩瑾
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products