polito.it
Politecnico di Torino (logo)

Automated Attack Graph generation from CTI for Kubernetes networks

Alessandro Ermini

Automated Attack Graph generation from CTI for Kubernetes networks.

Rel. Cataldo Basile, Francesco Settanni. Politecnico di Torino, Corso di laurea magistrale in Cybersecurity, 2025

Abstract:

In today’s digital landscape, organizations are increasingly reliant on cloud-native technolo- gies to build, deploy, and manage scalable, resilient, and efficient services. Among these technologies, Kubernetes has emerged as the de facto standard for container orchestration. However, the adoption of this new technology also brings about a new set of security challenges. Its dynamic, distributed architecture, combined with its complexity, expands the attack surface and introduces novel vulnerabilities that traditional threat modeling might struggle to address. At the same time, the cyber threat landscape continues to evolve rapidly. Adversaries are constantly developing and refining their tactics, techniques, and procedures (TTPs), often exploiting the misconfigurations of cloud-native infrastructures. In response to this ever-shifting threat environment, Cyber Threat Intelligence (CTI) has become a critical resource. CTI provides organizations with contextualized, relevant information about potential threats, enabling more informed defensive strategies. However, the volume and complexity of CTI data can overwhelm human analysts, making it difficult to extract timely and actionable insights. This thesis addresses this critical challenge by introducing an automated tool designed to generate attack graphs from structured CTI. These graphs model the possible attack paths that adversaries could exploit within Kubernetes-based environments, enabling a more proactive and informed approach to defense. The solution leverages the MulVAL attack graph engine, integrating it with a comprehensive representation of both Kubernetes infrastructure components and mapped adversarial techniques derived from CTI sources. By doing so, the tool is able to dynamically model potential security breaches, taking into account known vulnerabilities, system configurations, and attacker behavior patterns. The generated attack graphs serve as a visual and analytical aid for security analysts. They provide actionable insights, helping analysts understand the progression of potential attacks, identify critical assets at risk, prioritize mitigation efforts, and implement targeted countermeasures more effectively.

Relatori: Cataldo Basile, Francesco Settanni
Anno accademico: 2025/26
Tipo di pubblicazione: Elettronica
Numero di pagine: 93
Informazioni aggiuntive: Tesi secretata. Fulltext non presente
Soggetti:
Corso di laurea: Corso di laurea magistrale in Cybersecurity
Classe di laurea: Nuovo ordinamento > Laurea magistrale > LM-32 - INGEGNERIA INFORMATICA
Aziende collaboratrici: NON SPECIFICATO
URI: http://webthesis.biblio.polito.it/id/eprint/37935
Modifica (riservato agli operatori) Modifica (riservato agli operatori)