Alessandro Ermini
Automated Attack Graph generation from CTI for Kubernetes networks.
Rel. Cataldo Basile, Francesco Settanni. Politecnico di Torino, Corso di laurea magistrale in Cybersecurity, 2025
Abstract
In today’s digital landscape, organizations are increasingly reliant on cloud-native technolo- gies to build, deploy, and manage scalable, resilient, and efficient services. Among these technologies, Kubernetes has emerged as the de facto standard for container orchestration. However, the adoption of this new technology also brings about a new set of security challenges. Its dynamic, distributed architecture, combined with its complexity, expands the attack surface and introduces novel vulnerabilities that traditional threat modeling might struggle to address. At the same time, the cyber threat landscape continues to evolve rapidly. Adversaries are constantly developing and refining their tactics, techniques, and procedures (TTPs), often exploiting the misconfigurations of cloud-native infrastructures.
In response to this ever-shifting threat environment, Cyber Threat Intelligence (CTI) has become a critical resource
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Informazioni aggiuntive
Corso di laurea
Classe di laurea
URI
![]() |
Modifica (riservato agli operatori) |
