Marius Elmiger
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant
Elmiger, Marius; Lemoudden, Mouad; Pitropakis, Nikolaos; Buchanan, William J.
Authors
Mouad Lemoudden M.Lemoudden@napier.ac.uk
Lecturer
Dr Nick Pitropakis N.Pitropakis@napier.ac.uk
Associate Professor
Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Abstract
The challenge of securing IT environments has reached a new complexity level as a growing number of organisations adopt cloud solutions. This trend increases the possibility of overseen attack paths in an organisation’s IT infrastructure. This paper proposes a methodology for assessing the security of a Microsoft cloud tenant based on the relationships between different cloud entities through the use of graphs. This paper argues for using graph theory as an effective method to understand and uncover complex entity attack paths. To achieve this, we implemented a graph analytics platform using data from a Microsoft cloud test tenant. Methods based on graph theory proved to measurably reduce possible attack paths. Our research can support defenders who want to better understand the interrelationships of Microsoft cloud entities as well as identify and remediate possible attack paths.
Citation
Elmiger, M., Lemoudden, M., Pitropakis, N., & Buchanan, W. J. (2024). Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. International Journal of Information Security, 23, 467-485. https://doi.org/10.1007/s10207-023-00751-6
Journal Article Type | Article |
---|---|
Acceptance Date | Jun 1, 2023 |
Online Publication Date | Sep 19, 2023 |
Publication Date | 2024 |
Deposit Date | Sep 25, 2023 |
Publicly Available Date | Sep 27, 2023 |
Print ISSN | 2356-5845 |
Electronic ISSN | 2382-2619 |
Publisher | N&N Global Technology |
Peer Reviewed | Peer Reviewed |
Volume | 23 |
Pages | 467-485 |
DOI | https://doi.org/10.1007/s10207-023-00751-6 |
Keywords | Graph theory, Attack path, Microsoft cloud, Azure AD, Cloud security, Neo4j, BloodHound |
Public URL | http://researchrepository.napier.ac.uk/Output/3201445 |
Files
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant
(3.7 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
Hybrid Email Spam Detection Model Using Artificial Intelligence
(2020)
Journal Article
A Binary-based MapReduce Analysis for Cloud Logs
(2016)
Journal Article
A novel approach in detecting intrusions using NSLKDD database and MapReduce programming
(2017)
Journal Article
Attacking Windows Hello for Business: Is It What We Were Promised?
(2023)
Journal Article
A survey of cloud computing security overview of attack vectors and defense mechanisms
(2013)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search