Chrome Extension
WeChat Mini Program
Use on ChatGLM

Infrastructure Security Checking Service Based on Chaos Engineering Method

2023 XVIII International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY)(2023)

Cited 0|Views2
No score
Abstract
In today’s digital landscape, a company’s reputation hinges on its ability to safeguard sensitive information and maintain uninterrupted operations. Unfortunately, news headlines are rife with reports of data breaches and system failures caused by cyber attacks. These incidents not only result in dissatisfied customers but also prompt them to switch to competitors’ services, leading to significant financial losses for the affected companies. Rather than relying on hope, it is essential to proactively assess infrastructure security. This is precisely where security chaos engineering comes into play. This method involves intentionally introducing failures and faults into a system to identify potential vulnerabilities before they can be exploited. The goal is to build trust and confidence, not create chaos. The service, which is integrated into Vmware and aimed at checking virtual machines, enables businesses to evaluate their infrastructure’s security level and weaknesses. Through the SUNBURST attack case study, this study programmatically describes the primary vulnerabilities exploited by attackers. By simulating vulnerabilities within the infrastructure and collecting system logs during experiments, the service can evaluate the effectiveness of security tools. Real-world infrastructure testing has demonstrated the practical applicability of this service in identifying potential security weaknesses. This service can be a valuable tool for security departments looking to assess the effectiveness of their implemented tools.
More
Translated text
Key words
Infrastructure security,Chaos engineering,Data leakage,Infrastructure weaknesses
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined