Automated Security Analysis of Virtualized Infrastructures
Virtualization enables the increasing efficiency and elasticity of modern IT infrastructures, including Infrastructure as a Service. However, the operational complexity of virtualized infrastructures is high, due to their dynamics, multi-tenancy, and size. Misconfigurations and insider attacks car...
Main Author: | |
---|---|
Format: | Others |
Language: | en |
Published: |
2017
|
Online Access: | https://tuprints.ulb.tu-darmstadt.de/6610/7/Dissertation-Bleikertz-2017.pdf Bleikertz, Sören <http://tuprints.ulb.tu-darmstadt.de/view/person/Bleikertz=3AS=F6ren=3A=3A.html> (2017): Automated Security Analysis of Virtualized Infrastructures.Darmstadt, Technische Universität, [Ph.D. Thesis] |
id |
ndltd-tu-darmstadt.de-oai-tuprints.ulb.tu-darmstadt.de-6610 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-tu-darmstadt.de-oai-tuprints.ulb.tu-darmstadt.de-66102020-07-15T07:09:31Z http://tuprints.ulb.tu-darmstadt.de/6610/ Automated Security Analysis of Virtualized Infrastructures Bleikertz, Sören Virtualization enables the increasing efficiency and elasticity of modern IT infrastructures, including Infrastructure as a Service. However, the operational complexity of virtualized infrastructures is high, due to their dynamics, multi-tenancy, and size. Misconfigurations and insider attacks carry significant operational and security risks, such as breaches in tenant isolation, which put both the infrastructure provider and tenants at risk. In this thesis we study the question if it is possible to model and analyze complex, scalable, and dynamic virtualized infrastructures with regard to user-defined security and operational policies in an automated way. We establish a new practical and automated security analysis framework for virtualized infrastructures. First, we propose a novel tool that automatically extracts the configuration of heterogeneous environments and builds up a unified graph model of the configuration and topology. The tool is further extended with a monitoring component and a set of algorithms that translates system changes to graph model changes. The benefits of maintaining such a dynamic model are time reduction for model population and closing the gap for transient security violations. Our analysis is the first that lifts static information flow analysis to the entire virtualized infrastructure, in order to detect isolation failures between tenants on all resources. The analysis is configurable using customized rules to reflect the different trust assumptions of the users. We apply and evaluate our analysis system on the production infrastructure of a global financial institution. For the information flow analysis of dynamic infrastructures we propose the concept of dynamic rule-based information flow graphs and develop a set of algorithms that maintain such information flow graphs for dynamic system models. We generalize the analysis of isolation properties and establish a new generic analysis platform for virtualized infrastructures that allows to express a diverse set of security and operational policies in a formal language. The policy requirements are studied in a case-study with a cloud service provider. We are the first to employ a variety of theorem provers and model checkers to verify the state of a virtualized infrastructure against its policies. Additionally, we analyze dynamic behavior such as VM migrations. For the analysis of dynamic infrastructures we pursue both a reactive as well as a proactive approach. A reactive analysis system is developed that reduces the time between system change and analysis result. The system monitors the infrastructure for changes and employs dynamic information flow graphs to verify, for instance, tenant isolation. For the proactive analysis we propose a new model, the Operations Transition Model, which captures the changes of operations in the virtualized infrastructure as graph transformations. We build a novel analysis system using this model that performs automated run-time analysis of operations and also offers change planning. The operations transition model forms the basis for further research in model checking of virtualized infrastructures. 2017 Ph.D. Thesis NonPeerReviewed text only the rights of use according to UrhG https://tuprints.ulb.tu-darmstadt.de/6610/7/Dissertation-Bleikertz-2017.pdf Bleikertz, Sören <http://tuprints.ulb.tu-darmstadt.de/view/person/Bleikertz=3AS=F6ren=3A=3A.html> (2017): Automated Security Analysis of Virtualized Infrastructures.Darmstadt, Technische Universität, [Ph.D. Thesis] en info:eu-repo/semantics/doctoralThesis info:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
en |
format |
Others
|
sources |
NDLTD |
description |
Virtualization enables the increasing efficiency and elasticity of modern IT infrastructures, including
Infrastructure as a Service. However, the operational complexity of virtualized infrastructures is high,
due to their dynamics, multi-tenancy, and size. Misconfigurations and insider attacks carry significant
operational and security risks, such as breaches in tenant isolation, which put both the infrastructure
provider and tenants at risk.
In this thesis we study the question if it is possible to model and analyze complex, scalable, and dynamic
virtualized infrastructures with regard to user-defined security and operational policies in an automated
way. We establish a new practical and automated security analysis framework for virtualized infrastructures. First, we propose a novel tool that automatically extracts the configuration of heterogeneous
environments and builds up a unified graph model of the configuration and topology. The tool is further extended with a monitoring component and a set of algorithms that translates system changes to
graph model changes. The benefits of maintaining such a dynamic model are time reduction for model
population and closing the gap for transient security violations.
Our analysis is the first that lifts static information flow analysis to the entire virtualized infrastructure,
in order to detect isolation failures between tenants on all resources. The analysis is configurable using
customized rules to reflect the different trust assumptions of the users. We apply and evaluate our analysis
system on the production infrastructure of a global financial institution. For the information flow analysis
of dynamic infrastructures we propose the concept of dynamic rule-based information flow graphs and
develop a set of algorithms that maintain such information flow graphs for dynamic system models.
We generalize the analysis of isolation properties and establish a new generic analysis platform for
virtualized infrastructures that allows to express a diverse set of security and operational policies in a
formal language. The policy requirements are studied in a case-study with a cloud service provider. We
are the first to employ a variety of theorem provers and model checkers to verify the state of a virtualized
infrastructure against its policies. Additionally, we analyze dynamic behavior such as VM migrations.
For the analysis of dynamic infrastructures we pursue both a reactive as well as a proactive approach. A
reactive analysis system is developed that reduces the time between system change and analysis result.
The system monitors the infrastructure for changes and employs dynamic information flow graphs to
verify, for instance, tenant isolation. For the proactive analysis we propose a new model, the Operations
Transition Model, which captures the changes of operations in the virtualized infrastructure as graph
transformations. We build a novel analysis system using this model that performs automated run-time
analysis of operations and also offers change planning. The operations transition model forms the basis
for further research in model checking of virtualized infrastructures. |
author |
Bleikertz, Sören |
spellingShingle |
Bleikertz, Sören Automated Security Analysis of Virtualized Infrastructures |
author_facet |
Bleikertz, Sören |
author_sort |
Bleikertz, Sören |
title |
Automated Security Analysis of Virtualized Infrastructures |
title_short |
Automated Security Analysis of Virtualized Infrastructures |
title_full |
Automated Security Analysis of Virtualized Infrastructures |
title_fullStr |
Automated Security Analysis of Virtualized Infrastructures |
title_full_unstemmed |
Automated Security Analysis of Virtualized Infrastructures |
title_sort |
automated security analysis of virtualized infrastructures |
publishDate |
2017 |
url |
https://tuprints.ulb.tu-darmstadt.de/6610/7/Dissertation-Bleikertz-2017.pdf Bleikertz, Sören <http://tuprints.ulb.tu-darmstadt.de/view/person/Bleikertz=3AS=F6ren=3A=3A.html> (2017): Automated Security Analysis of Virtualized Infrastructures.Darmstadt, Technische Universität, [Ph.D. Thesis] |
work_keys_str_mv |
AT bleikertzsoren automatedsecurityanalysisofvirtualizedinfrastructures |
_version_ |
1719327417037750272 |