VAPT- A Service on Eucalyptus Cloud

Swapna Shetye
Swapna ShetyeMjukvara Testare på FRISQ AB em FRISQ AB

This paper describes the concept of implementing the network vulnerability assessment process as a web service in Eucalyptus cloud.This paper is published in one of the international conferences.I implemented the mentioned concept during my M.E. thesis.

Proposal of VAPT as a Service on Cloud
Mrs. Swapna Shetye
Information Technology Department
Terna Engineering College
Mumbai, India
sgkhatu@gmail.com
Dr. Deven Shah
Information Technology Department
Terna Engineering College
Mumbai, India
Sir.deven@gmail.com
Abstract— Vulnerability refers to a weakness in a system. A security risk is categorised as vulnerability if it is identified
as a possible means of attack. Hence a vulnerability assessment is a vital process for any organization. Vulnerability
assessment process scans client’s network to discover potential threats. With penetration testing client network is
exploitedwith identifiedpotential threats underthe controlled environment. These two processes together are termed as
VAPT (Vulnerability Assessment Penetration Testing).This paper illustrates a proposal to create VAPT as a service on
the cloud. Only authorizedusers will be able to subscribe this service. VAPT as service on cloud will combine benefits of
private cloud architecture in order to support multiple client requests.
Keywords- Network Security;VAPT;vulnerabilities; private cloud security.
I. INTRODUCTION
Today most of the organizations are using firewalls, anti-virus applications and Intrusion Detection System (IDS)
for security reasons. Despite heavy reliance on such security measures organizations find their environments
exploitable to the intruder’s attacks. Different vulnerability attacks are Eavesdropping, Data modification, Identity
spoofing, Password based attacks, Denial-of-Service Attack, Man-in-the-Middle Attack, Compromised-Key Attack,
Sniffer attack. Today every organization is in need of security policies that will help network administrators to keep
their networks safe from such vulnerability attacks. It has also become essential to create and execute predefined
policies that will identify the weaknesses i.e. vulnerabilities in the network on scheduled periodic basis. Such
identified vulnerabilities are the potential opportunities for an attacker.
Different network vulnerability assessment tools available are Nessus,GFI Lan guard, map, RetiAssessment, core
impact,ISS internet scanner, X scan,Sara,QualisGuard,Saint,MBSA.A vulnerability assessment [9, 5] takes network
parameters as input and finds the weaknesses that need to be fixed. An ongoing vulnerability assessment process, in
combination with proper remediation, can help ensure that the network is fortified to withstand the latest attacks.
Vulnerability assessment provides a comprehensive picture of all systems, services and devices that can breach a
network, as well as a complete, prioritized list of vulnerabilities that need to be addressed. Remediation is the
follow-up stage after vulnerabilities have been accurately identified. The true benefit of vulnerability assessment is
that it is a powerful proactive process for securing an enterprise network. With vulnerability assessment [10]
solutions potential security holes are fixed before they become problematic, allowing companies to fend off attacks
before they occur. Penetration testing is the process of attempting to exploit previously identified vulnerabilities
found during the vulnerability assessment.
The main idea behind the paper is to propose a solution that will combine VAPT service and advantages of private
cloud architecture. This service will then be provided to the registered clients on as needed basis. This service will
require private cloud setup inclusive of VAPT service and a web interface [4] for the clients. A web interface for end
clients will also act as an agent which will execute some script in order to fetch client’s network parameters and
send them to the private cloud where the VAPT service resides. The cloud in turn takes care of VM instance
generation for corresponding client. Then the target network of the client will be scanned and the result will be
produced in standard format like PCI DSS.
II. EASE OF USE
VAPT process comprises of 9 steps and they are Scope, Information Gathering, Vulnerability Detection,
Information Analysis and Planning, Penetration Testing, Privilege Escalation, Result Analysis, Reporting and
Cleaning.
In this paper we propose a VAPT service on a private cloud where the private cloud will b e created using
Eucalyptus open source private cloud architecture setup. Eucalyptus is a Linux-based open-source software
architecture that implements efficiency-enhancing private and hybrid clouds within an enterprise’s existing IT
infrastructure. The name Eucalyptus stands for Elastic Utility Computing Architecture for Linking Your Programs to
Useful Systems. A Eucalyptus private cloud is deployed across an enterprise’s “on premise” data center
infrastructure and is accessed by users over enterprise intranet. Thus, sensitive data remains entirely secure from
external intrusion behind the enterprise firewall.Eucalyptus cloud platform pools together existing virtualized
infrastructure to create cloud resources for compute, network and storage [11]. The benefits of Eucalyptus cloud are
highly efficient scalability, organization agility, and increased trust and control for IT [11].
III. THE PROBLEM DEFINITION
The problem definition comprises of creating VAPT as a service [4, 6] on the cloud. The service will be available to
the clients through web interface. Only authorized users will be able to subscribe the service. Finally the
vulnerability report in standard format will be generated and will be forwarded to the client.
Fig2.VAPT as a service Use Case Diagram
Vulnerability is a weakness which allows an attacker to reduce an information assurance. Vulnerability Assessment
is Process of identifying and quantifying vulnerabilities in an environment and emphasizing on identifying areas that
are vulnerable.
IV. THE PROPOSED ARCHITECTURE
The proposed mechanism is to build the Eucalyptus private cloud, creating VMimage with VAPT Scanner tool
installed in it, uploading this image on the cloud, creating the VMinstance for incoming client request. Finally
VAPT on the cloud produces vulnerability report in standard format and send this to client.
Fig4. VAPT as a Service on Cloud Architecture
V. METHODOLOGY
Prerequisites to successful implementation of VAPT as a service on cloud are listed below.
 Setting up a private cloud [1]. (with the help of Eucalyptus framework)
 Creating virtual machine image.
 Upload that machine image on cloud.
 Provide web interface to the clients for VAPT service subscription.
 Scan registered client’s network inside the Virtual machine image instance.
 Saving the scan results in the cloud storage.
Create soft computing
platform
Develop and Deploy
Private Cloud
Create User Interface For
Client
Scan Client Network
Generate Standard report
Fig3.Proposed Mechanism
VI. PERFORMANCE EVALUATION
First Client subscribes for VAPT service using a web interface. After that cloud [8] service provide a login window
for authentication and send welcome message to the client. Some script will then execute on client’s machine to
fetch all network parameters. These parameters will then be passed to the cloud.CLC will then create VMinstance on
the node machine.VAPT for every client will be performed inside designated node. Finally vulnerability reports
generated in standard format will be forwarded to client as well as stored inside the cloud walrus.
Common Vulnerability Scoring System (CVSS) [3, 7, 9] is almost an industrial standard for assessing the security
vulnerabilities. It attempts to evaluate the degree of risks posed by vulnerabilities, so mitigation efforts can be
prioritized. The measures termed scores are computed using assessments (called metrics) of vulnerability attributes
based on the opinions of experts in the field Common Vulnerability Scoring System (CVSS) [12]. CVSS defines a
number of metrics that can be used to characterize vulnerability. For each metric, a few qualitative levels are defined
and a numerical value is associated with each level. CVSS is composed of three major metric groups: Base,
Temporal and Environmental.
VII. IMPLEMENTATION PLATFORM
A. HARDWARE:
 Fast processor (p4/p5 2 GHz Intel chipset)
 Min. 1 GB RAM
 100 GB HDD (as clients are limited)
 Bandwidth (full bandwidth is available i.e. 100 mbps)
B. SOFTWARE:
 Eucalyptus Framework for cloud deployment
 VAPT vulnerability assessment tool(Nessus)
 MapReduce framework for application development
 SAAJ [SOAP Attachment API for JAVA ] for distributed communication
 Data management Tools
C. SKILLS / EXPERTISE:
 Strong analytical, documentation, and communication skills.
 Understanding of Tool & its technologies
 Understanding of generated report analysis.
 Understanding of network traffic analysis
 Experience with trouble ticketing and change management tools.
 Passion for all things information technology and information security
 Natural curiosity and ability to learn new skills quickly.
VIII. CONCLUSION
One major advantage of “VAPT as a service on the cloud” is that it lends itself to subscription-based software,
which doesn’t require complex licensing or distribution points, which not only cuts cost, but also ensures no piracy.
When actually providing a service, clients are locked into paying every time that they want to use the service.
Clients don’t have to invest in any local hardware and can access their information and services from any Internet
access. This type of application moves away fromthe requirements of having big applications on client’s systems to
processing everything on the servers, which means clients need less money to get into application.
From Service providers point of view setting up private cloud architecture brings advantages for an organization
where the optimum resources utilization can be achieved and will also provide security to the organization‘s
intranetworking from outside networks. From end clients point of view subscribing VAPT service which will be part
of private cloud will converge into an enterprise level solution for resource hungry applications.
REFERENCES
[1] NIST Definitionof CloudComputing, http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc
[2] Proceedings of the1st International CyberResilience Conference, EdithCowan University,PerthWestern Australia, 23rdAugust 2010
[3] http://en.wikipedia.org/wiki/Vulnerability_assessment
[4] Building Applications in The CloudBy Chris Moyer
[5] http://www.eeye.com/eEyeDigitalSecurity/media/White-Papers/The-Need-for-Vulnerability-Assessment-and-Remediation-What-My-CIO-
Needs-to-Know-WP.pdf
[6] “Effective NetworkVulnerabilityAssessment through Model Abstraction” by Suhang, XiningOu, John Homer 8thInternational
Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011.
[7] “Active vulnerabilityassessment of computer networks by simulationofcomplex remote attacks “by St. PetersburgInst.for Informatics &
Autom., Liniya,Russia appearedin Computer Networks andMobile Computing, 2003. ICCNMC 2003.
[8] Amazon Compute Cloud(AmazonEC2),http:// Elastic aws.amazon.com/ec2/, [retrieved: May,201
[9] http://en.wikipedia.org/wiki/Vulnerability_assessment
[10] White Paper onwhat is vulnerability assessment preparedon July 17, 2011 by DEMYO INC.
[11] http://www.eucalyptus.com/eucalyptus-cloud/iaas

Recomendados

VAPT Infomagnum por
VAPT InfomagnumVAPT Infomagnum
VAPT InfomagnumARUN REDDY M
255 visualizações6 slides
Chapter 2 konsep dasar keamanan por
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
477 visualizações28 slides
Vapt life cycle por
Vapt life cycleVapt life cycle
Vapt life cyclepenetration Tester
632 visualizações20 slides
2021 Nonprofit Cybersecurity Incident Report por
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
429 visualizações28 slides
SME Cyber Insurance por
SME Cyber Insurance SME Cyber Insurance
SME Cyber Insurance Netpluz Asia Pte Ltd
155 visualizações9 slides
Fundamentals of information systems security ( pdf drive ) chapter 1 por
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
1.1K visualizações45 slides

Mais conteúdo relacionado

Mais procurados

Vulnerability assessment & Penetration testing Basics por
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
2K visualizações17 slides
Data Safety And Security por
Data Safety And SecurityData Safety And Security
Data Safety And SecurityConstantine Karbaliotis
3K visualizações20 slides
Data Security in Healthcare por
Data Security in HealthcareData Security in Healthcare
Data Security in HealthcareQuick Heal Technologies Ltd.
2.8K visualizações17 slides
Cybersecurity Training por
Cybersecurity TrainingCybersecurity Training
Cybersecurity TrainingWindstoneHealth
657 visualizações22 slides
Supply chain-attack por
Supply chain-attackSupply chain-attack
Supply chain-attackvikram vashisth
669 visualizações11 slides
Application Security: Safeguarding Data, Protecting Reputations por
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
254 visualizações7 slides

Mais procurados(20)

Vulnerability assessment & Penetration testing Basics por Mohammed Adam
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
Mohammed Adam2K visualizações
Cybersecurity Training por WindstoneHealth
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth657 visualizações
Supply chain-attack por vikram vashisth
Supply chain-attackSupply chain-attack
Supply chain-attack
vikram vashisth669 visualizações
Application Security: Safeguarding Data, Protecting Reputations por Cognizant
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant254 visualizações
Chapter 4 vulnerability threat and attack por newbie2019
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
newbie2019444 visualizações
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at... por Michael Noel
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel221 visualizações
Topic11 por Anne Starr
Topic11Topic11
Topic11
Anne Starr76 visualizações
Preventing Data Breaches por xband
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
xband850 visualizações
Network Security of Data Protection por UthsoNandy
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
UthsoNandy98 visualizações
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr... por ijtsrd
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
ijtsrd35 visualizações
Ethical hacking and social engineering por Sweta Kumari Barnwal
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal926 visualizações
How Can I Reduce The Risk Of A Cyber-Attack? por Osei Fortune
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
Osei Fortune1.3K visualizações
Empowering Application Security Protection in the World of DevOps por IBM Security
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
IBM Security974 visualizações
Healthcare IT Security Threats & Ways to Defend Them por CheapSSLsecurity
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
CheapSSLsecurity398 visualizações
Threat Modeling - Writing Secure Code por Caleb Jenkins
Threat Modeling - Writing Secure CodeThreat Modeling - Writing Secure Code
Threat Modeling - Writing Secure Code
Caleb Jenkins2.4K visualizações
Report: Study and Implementation of Advance Intrusion Detection and Preventio... por Deepak Mishra
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Deepak Mishra3.3K visualizações

Similar a VAPT- A Service on Eucalyptus Cloud

IRJET- Developing an Algorithm to Detect Malware in Cloud por
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET Journal
11 visualizações14 slides
Secure Desktop Computing In the Cloud por
Secure Desktop Computing In the CloudSecure Desktop Computing In the Cloud
Secure Desktop Computing In the CloudIRJET Journal
3 visualizações3 slides
C43021014 por
C43021014C43021014
C43021014IJERA Editor
237 visualizações5 slides
SVAC Firewall Restriction with Security in Cloud over Virtual Environment por
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentSVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentIJTET Journal
225 visualizações5 slides
original research papers por
original research papersoriginal research papers
original research papersrikaseorika
4 visualizações5 slides
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit... por
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...IJIR JOURNALS IJIRUSA
314 visualizações5 slides

Similar a VAPT- A Service on Eucalyptus Cloud(20)

IRJET- Developing an Algorithm to Detect Malware in Cloud por IRJET Journal
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET Journal11 visualizações
Secure Desktop Computing In the Cloud por IRJET Journal
Secure Desktop Computing In the CloudSecure Desktop Computing In the Cloud
Secure Desktop Computing In the Cloud
IRJET Journal3 visualizações
C43021014 por IJERA Editor
C43021014C43021014
C43021014
IJERA Editor237 visualizações
SVAC Firewall Restriction with Security in Cloud over Virtual Environment por IJTET Journal
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentSVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
IJTET Journal225 visualizações
original research papers por rikaseorika
original research papersoriginal research papers
original research papers
rikaseorika4 visualizações
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit... por IJIR JOURNALS IJIRUSA
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA314 visualizações
International Conference on Advances in Computing, Communicati.docx por vrickens
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
vrickens5 visualizações
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net... por Migrant Systems
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Migrant Systems 5.8K visualizações
Cloud Computing por Mannat Singh
 Cloud Computing Cloud Computing
Cloud Computing
Mannat Singh254 visualizações
IRJET- A Survey on SaaS-Attacks and Digital Forensic por IRJET Journal
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal45 visualizações
IRJET- Survey on Security Threats and Remedies in Cloud Computing por IRJET Journal
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal24 visualizações
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for... por VMworld
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld2.8K visualizações
Rik Ferguson por CloudExpoEurope
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope425 visualizações
Risk Analysis and Mitigation in Virtualized Environments por Siddharth Coontoor
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor1.6K visualizações
Security in a Virtualised Computing por IOSR Journals
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
IOSR Journals361 visualizações
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co... por Editor IJCATR
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR361 visualizações
Nice network intrusion detection and countermeasure por IEEEFINALYEARPROJECTS
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasure
IEEEFINALYEARPROJECTS5.1K visualizações
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ... por IEEEGLOBALSOFTTECHNOLOGIES
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...
IEEEGLOBALSOFTTECHNOLOGIES1.7K visualizações
Open Programmable Architecture for Java-enabled Network Devices por Tal Lavian Ph.D.
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network Devices
Tal Lavian Ph.D.595 visualizações

Último

Software testing company in India.pptx por
Software testing company in India.pptxSoftware testing company in India.pptx
Software testing company in India.pptxSakshiPatel82
7 visualizações9 slides
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ... por
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...Donato Onofri
773 visualizações34 slides
DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)... por
DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)...DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)...
DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)...Deltares
9 visualizações34 slides
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx por
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptxanimuscrm
13 visualizações19 slides
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J... por
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...Deltares
9 visualizações24 slides
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema por
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - GeertsemaDSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - GeertsemaDeltares
17 visualizações13 slides

Último(20)

Software testing company in India.pptx por SakshiPatel82
Software testing company in India.pptxSoftware testing company in India.pptx
Software testing company in India.pptx
SakshiPatel827 visualizações
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ... por Donato Onofri
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...
Donato Onofri773 visualizações
DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)... por Deltares
DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)...DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)...
DSD-INT 2023 Modelling litter in the Yarra and Maribyrnong Rivers (Australia)...
Deltares9 visualizações
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx por animuscrm
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
animuscrm13 visualizações
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J... por Deltares
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...
Deltares9 visualizações
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema por Deltares
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - GeertsemaDSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema
Deltares17 visualizações
Cycleops - Automate deployments on top of bare metal.pptx por Thanassis Parathyras
Cycleops - Automate deployments on top of bare metal.pptxCycleops - Automate deployments on top of bare metal.pptx
Cycleops - Automate deployments on top of bare metal.pptx
Thanassis Parathyras31 visualizações
DSD-INT 2023 Thermobaricity in 3D DCSM-FM - taking pressure into account in t... por Deltares
DSD-INT 2023 Thermobaricity in 3D DCSM-FM - taking pressure into account in t...DSD-INT 2023 Thermobaricity in 3D DCSM-FM - taking pressure into account in t...
DSD-INT 2023 Thermobaricity in 3D DCSM-FM - taking pressure into account in t...
Deltares9 visualizações
DSD-INT 2023 Leveraging the results of a 3D hydrodynamic model to improve the... por Deltares
DSD-INT 2023 Leveraging the results of a 3D hydrodynamic model to improve the...DSD-INT 2023 Leveraging the results of a 3D hydrodynamic model to improve the...
DSD-INT 2023 Leveraging the results of a 3D hydrodynamic model to improve the...
Deltares6 visualizações
Winter '24 Release Chat.pdf por melbourneauuser
Winter '24 Release Chat.pdfWinter '24 Release Chat.pdf
Winter '24 Release Chat.pdf
melbourneauuser9 visualizações
SAP FOR CONTRACT MANUFACTURING.pdf por Virendra Rai, PMP
SAP FOR CONTRACT MANUFACTURING.pdfSAP FOR CONTRACT MANUFACTURING.pdf
SAP FOR CONTRACT MANUFACTURING.pdf
Virendra Rai, PMP11 visualizações
What Can Employee Monitoring Software Do?​ por wAnywhere
What Can Employee Monitoring Software Do?​What Can Employee Monitoring Software Do?​
What Can Employee Monitoring Software Do?​
wAnywhere21 visualizações
Fleet Management Software in India por Fleetable
Fleet Management Software in India Fleet Management Software in India
Fleet Management Software in India
Fleetable11 visualizações
Headless JS UG Presentation.pptx por Jack Spektor
Headless JS UG Presentation.pptxHeadless JS UG Presentation.pptx
Headless JS UG Presentation.pptx
Jack Spektor7 visualizações
Navigating container technology for enhanced security by Niklas Saari por Metosin Oy
Navigating container technology for enhanced security by Niklas SaariNavigating container technology for enhanced security by Niklas Saari
Navigating container technology for enhanced security by Niklas Saari
Metosin Oy12 visualizações
Keep por Geniusee
KeepKeep
Keep
Geniusee75 visualizações
Neo4j y GenAI por Neo4j
Neo4j y GenAI Neo4j y GenAI
Neo4j y GenAI
Neo4j45 visualizações
SUGCON ANZ Presentation V2.1 Final.pptx por Jack Spektor
SUGCON ANZ Presentation V2.1 Final.pptxSUGCON ANZ Presentation V2.1 Final.pptx
SUGCON ANZ Presentation V2.1 Final.pptx
Jack Spektor22 visualizações
DevsRank por devsrank786
DevsRankDevsRank
DevsRank
devsrank78611 visualizações

VAPT- A Service on Eucalyptus Cloud

  • 1. Proposal of VAPT as a Service on Cloud Mrs. Swapna Shetye Information Technology Department Terna Engineering College Mumbai, India sgkhatu@gmail.com Dr. Deven Shah Information Technology Department Terna Engineering College Mumbai, India Sir.deven@gmail.com Abstract— Vulnerability refers to a weakness in a system. A security risk is categorised as vulnerability if it is identified as a possible means of attack. Hence a vulnerability assessment is a vital process for any organization. Vulnerability assessment process scans client’s network to discover potential threats. With penetration testing client network is exploitedwith identifiedpotential threats underthe controlled environment. These two processes together are termed as VAPT (Vulnerability Assessment Penetration Testing).This paper illustrates a proposal to create VAPT as a service on the cloud. Only authorizedusers will be able to subscribe this service. VAPT as service on cloud will combine benefits of private cloud architecture in order to support multiple client requests. Keywords- Network Security;VAPT;vulnerabilities; private cloud security. I. INTRODUCTION Today most of the organizations are using firewalls, anti-virus applications and Intrusion Detection System (IDS) for security reasons. Despite heavy reliance on such security measures organizations find their environments exploitable to the intruder’s attacks. Different vulnerability attacks are Eavesdropping, Data modification, Identity spoofing, Password based attacks, Denial-of-Service Attack, Man-in-the-Middle Attack, Compromised-Key Attack, Sniffer attack. Today every organization is in need of security policies that will help network administrators to keep their networks safe from such vulnerability attacks. It has also become essential to create and execute predefined policies that will identify the weaknesses i.e. vulnerabilities in the network on scheduled periodic basis. Such identified vulnerabilities are the potential opportunities for an attacker. Different network vulnerability assessment tools available are Nessus,GFI Lan guard, map, RetiAssessment, core impact,ISS internet scanner, X scan,Sara,QualisGuard,Saint,MBSA.A vulnerability assessment [9, 5] takes network parameters as input and finds the weaknesses that need to be fixed. An ongoing vulnerability assessment process, in combination with proper remediation, can help ensure that the network is fortified to withstand the latest attacks. Vulnerability assessment provides a comprehensive picture of all systems, services and devices that can breach a network, as well as a complete, prioritized list of vulnerabilities that need to be addressed. Remediation is the follow-up stage after vulnerabilities have been accurately identified. The true benefit of vulnerability assessment is that it is a powerful proactive process for securing an enterprise network. With vulnerability assessment [10] solutions potential security holes are fixed before they become problematic, allowing companies to fend off attacks before they occur. Penetration testing is the process of attempting to exploit previously identified vulnerabilities found during the vulnerability assessment. The main idea behind the paper is to propose a solution that will combine VAPT service and advantages of private cloud architecture. This service will then be provided to the registered clients on as needed basis. This service will require private cloud setup inclusive of VAPT service and a web interface [4] for the clients. A web interface for end clients will also act as an agent which will execute some script in order to fetch client’s network parameters and send them to the private cloud where the VAPT service resides. The cloud in turn takes care of VM instance generation for corresponding client. Then the target network of the client will be scanned and the result will be produced in standard format like PCI DSS.
  • 2. II. EASE OF USE VAPT process comprises of 9 steps and they are Scope, Information Gathering, Vulnerability Detection, Information Analysis and Planning, Penetration Testing, Privilege Escalation, Result Analysis, Reporting and Cleaning. In this paper we propose a VAPT service on a private cloud where the private cloud will b e created using Eucalyptus open source private cloud architecture setup. Eucalyptus is a Linux-based open-source software architecture that implements efficiency-enhancing private and hybrid clouds within an enterprise’s existing IT infrastructure. The name Eucalyptus stands for Elastic Utility Computing Architecture for Linking Your Programs to Useful Systems. A Eucalyptus private cloud is deployed across an enterprise’s “on premise” data center infrastructure and is accessed by users over enterprise intranet. Thus, sensitive data remains entirely secure from external intrusion behind the enterprise firewall.Eucalyptus cloud platform pools together existing virtualized infrastructure to create cloud resources for compute, network and storage [11]. The benefits of Eucalyptus cloud are highly efficient scalability, organization agility, and increased trust and control for IT [11]. III. THE PROBLEM DEFINITION The problem definition comprises of creating VAPT as a service [4, 6] on the cloud. The service will be available to the clients through web interface. Only authorized users will be able to subscribe the service. Finally the vulnerability report in standard format will be generated and will be forwarded to the client. Fig2.VAPT as a service Use Case Diagram Vulnerability is a weakness which allows an attacker to reduce an information assurance. Vulnerability Assessment is Process of identifying and quantifying vulnerabilities in an environment and emphasizing on identifying areas that are vulnerable. IV. THE PROPOSED ARCHITECTURE The proposed mechanism is to build the Eucalyptus private cloud, creating VMimage with VAPT Scanner tool installed in it, uploading this image on the cloud, creating the VMinstance for incoming client request. Finally VAPT on the cloud produces vulnerability report in standard format and send this to client.
  • 3. Fig4. VAPT as a Service on Cloud Architecture V. METHODOLOGY Prerequisites to successful implementation of VAPT as a service on cloud are listed below.  Setting up a private cloud [1]. (with the help of Eucalyptus framework)  Creating virtual machine image.  Upload that machine image on cloud.  Provide web interface to the clients for VAPT service subscription.  Scan registered client’s network inside the Virtual machine image instance.  Saving the scan results in the cloud storage. Create soft computing platform Develop and Deploy Private Cloud Create User Interface For Client Scan Client Network Generate Standard report Fig3.Proposed Mechanism VI. PERFORMANCE EVALUATION First Client subscribes for VAPT service using a web interface. After that cloud [8] service provide a login window for authentication and send welcome message to the client. Some script will then execute on client’s machine to fetch all network parameters. These parameters will then be passed to the cloud.CLC will then create VMinstance on the node machine.VAPT for every client will be performed inside designated node. Finally vulnerability reports generated in standard format will be forwarded to client as well as stored inside the cloud walrus. Common Vulnerability Scoring System (CVSS) [3, 7, 9] is almost an industrial standard for assessing the security vulnerabilities. It attempts to evaluate the degree of risks posed by vulnerabilities, so mitigation efforts can be prioritized. The measures termed scores are computed using assessments (called metrics) of vulnerability attributes based on the opinions of experts in the field Common Vulnerability Scoring System (CVSS) [12]. CVSS defines a number of metrics that can be used to characterize vulnerability. For each metric, a few qualitative levels are defined and a numerical value is associated with each level. CVSS is composed of three major metric groups: Base, Temporal and Environmental.
  • 4. VII. IMPLEMENTATION PLATFORM A. HARDWARE:  Fast processor (p4/p5 2 GHz Intel chipset)  Min. 1 GB RAM  100 GB HDD (as clients are limited)  Bandwidth (full bandwidth is available i.e. 100 mbps) B. SOFTWARE:  Eucalyptus Framework for cloud deployment  VAPT vulnerability assessment tool(Nessus)  MapReduce framework for application development  SAAJ [SOAP Attachment API for JAVA ] for distributed communication  Data management Tools C. SKILLS / EXPERTISE:  Strong analytical, documentation, and communication skills.  Understanding of Tool & its technologies  Understanding of generated report analysis.  Understanding of network traffic analysis  Experience with trouble ticketing and change management tools.  Passion for all things information technology and information security  Natural curiosity and ability to learn new skills quickly. VIII. CONCLUSION One major advantage of “VAPT as a service on the cloud” is that it lends itself to subscription-based software, which doesn’t require complex licensing or distribution points, which not only cuts cost, but also ensures no piracy. When actually providing a service, clients are locked into paying every time that they want to use the service. Clients don’t have to invest in any local hardware and can access their information and services from any Internet access. This type of application moves away fromthe requirements of having big applications on client’s systems to processing everything on the servers, which means clients need less money to get into application. From Service providers point of view setting up private cloud architecture brings advantages for an organization where the optimum resources utilization can be achieved and will also provide security to the organization‘s intranetworking from outside networks. From end clients point of view subscribing VAPT service which will be part of private cloud will converge into an enterprise level solution for resource hungry applications. REFERENCES [1] NIST Definitionof CloudComputing, http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc [2] Proceedings of the1st International CyberResilience Conference, EdithCowan University,PerthWestern Australia, 23rdAugust 2010 [3] http://en.wikipedia.org/wiki/Vulnerability_assessment [4] Building Applications in The CloudBy Chris Moyer [5] http://www.eeye.com/eEyeDigitalSecurity/media/White-Papers/The-Need-for-Vulnerability-Assessment-and-Remediation-What-My-CIO- Needs-to-Know-WP.pdf [6] “Effective NetworkVulnerabilityAssessment through Model Abstraction” by Suhang, XiningOu, John Homer 8thInternational Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. [7] “Active vulnerabilityassessment of computer networks by simulationofcomplex remote attacks “by St. PetersburgInst.for Informatics & Autom., Liniya,Russia appearedin Computer Networks andMobile Computing, 2003. ICCNMC 2003. [8] Amazon Compute Cloud(AmazonEC2),http:// Elastic aws.amazon.com/ec2/, [retrieved: May,201 [9] http://en.wikipedia.org/wiki/Vulnerability_assessment [10] White Paper onwhat is vulnerability assessment preparedon July 17, 2011 by DEMYO INC. [11] http://www.eucalyptus.com/eucalyptus-cloud/iaas