CloudShield AI

AI-Driven Defense Against Cloud Vulnerabilities

CloudShield AI employs multiple LLM agents to autonomously identify and exploit cloud security vulnerabilities in real-time. By providing dynamic analysis, attack path exploration, and detailed remediation strategies, CloudShield AI enhances cloud security policies and prevents potential attacks.

Why It Matters

Cloud security is a critical challenge in today's digital landscape, with misconfigurations and cyber attacks causing billions in losses annually. Security engineers must manage thousands of access policies for countless users, groups, roles, and data stores, making the system prone to errors. Frequent changes, such as adding temporary contractors, complicate tracking and verification. AWS alone offers thousands of actions, providing numerous opportunities for attackers to exploit. New strategies emerge regularly, further exacerbating these vulnerabilities.

Slow Detection

With data stored in the cloud, it takes an average of 277 days to identify and contain a breach. IBM Report

Increased Attacks

Attacks on open-source libraries, critical to cloud systems, have increased by 742% since ChatGPT's release.

Phishing Attacks

Phishing emails, which can target cloud credentials, have increased by 1265% since ChatGPT launched. CNBC Report

Our Vision

We aim to leverage AI and LLM agents to provide an autonomous, intelligent defense system capable of dynamically analyzing current permissions, identifying and exploiting potential vulnerabilities in real-time, and offering detailed remediation strategies to enhance cloud security policies and prevent potential attacks.

Technical Framework Overview

CloudShieldAI leverages the CrewAI agentic framework to integrate Tasks, AI Agents, and Tools. Tasks define steps for identifying data access paths, classifying documents, and simulating attacks. Specialized AI Agents execute these tasks both sequentially and asynchronously, autonomously coordinating and invoking tools that interact with cloud APIs and external packages (e.g. for encryption). This architecture ensures validated actions, minimizing inaccuracies and "hallucinations."

Framework Overview

The Team

Portrait of Piergiuseppe

Piergiuseppe Mallozzi

AI and Cyber-Security Researcher

LinkedIn

Personal Website

Github

This project took first place and was awarded the grand prize at the Craft HackAIthon 2024

Hackathon Win

Watch our Demo.

Interested in Our Project?

Leave your email to stay updated on our progress, or send us a message with your thoughts and feedback!

No spam.