Cloud databases: a breeding ground for ransomware

被引:0
|
作者
Sood A.K. [1 ]
Wiley M. [1 ]
机构
[1] F5
关键词
Compendex;
D O I
10.12968/S1353-4858(23)70004-4
中图分类号
学科分类号
摘要
Attackers are targeting cloud databases to trigger ransomware infections by directly taking control of the stored data. Databases are the foundational bricks allowing us to store data and provide a uniform capability so that various applications can dynamically transact data. Compromising the data provides an edge to the attackers to extract monetary gain using stolen information. In this article, we examine the root causes of ransomware infection in cloud databases and present real-world case studies of detecting ransomware infections in Elasticsearch and MongoDB cloud instances. © 2023 MA Business Ltd.
引用
收藏
相关论文
共 50 条
  • [1] Ransomware: The CryptoVirus Subverting Cloud Security
    Bhattacharya, S.
    Kumar, C. R. S.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [2] Ransomware Attacks: Radical Menace for Cloud Computing
    Sajjan, Rajani S.
    Ghorpade, Vijay R.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1640 - 1646
  • [3] Cloud databases: A paradigm shift in databases
    Department of Computer Science and Application, MCM DAV College for Women, Chandigarh, India
    不详
    Int. J. Comput. Sci. Issues, 1600, 4 4-3 (77-83):
  • [4] Ransomware Detection in Databases through Dynamic Analysis of Query Sequences
    Sendner, Christoph
    Ifflaender, Lukas
    Schindler, Sebastian
    Jobst, Michael
    Dmitrienko, Alexandra
    Kounev, Samuel
    2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, : 326 - 334
  • [5] The Effectiveness Of Cloud Databases
    Jain, Niraja
    Raghu, B.
    Deshpande, A. V.
    Khanaa, V.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [6] Facing ransomware: an approach with private cloud and sentinel software
    Martínez-García H.A.
    Computer Fraud and Security, 2020, 2020 (08): : 16 - 19
  • [7] BREEDING GROUND
    Pinkerton, Nick
    FILM COMMENT, 2017, 53 (06) : 58 - 63
  • [8] Breeding ground?
    Rosen, Emanuel
    JOURNAL OF CATARACT AND REFRACTIVE SURGERY, 2013, 39 (02): : 153 - 153
  • [9] CloudJump: Optimizing Cloud Databases for Cloud Storages
    Chen, Zongzhi
    Yang, Xinjun
    Li, Feifei
    Cheng, Xuntao
    Hu, Qingda
    Miao, Zheyu
    Xie, Rongbiao
    Wu, Xiaofei
    Wang, Kang
    Song, Zhao
    Sun, Haiqing
    Zhuang, Zechao
    Yang, Yuming
    Xu, Jie
    Yin, Liang
    Zhou, Wenchao
    Wang, Sheng
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2022, 15 (12): : 3432 - 3444
  • [10] Comparison of the Behaviour of Local Databases and Databases Located in the Cloud
    Szczyrbowski, Marcin
    Myszor, Dariusz
    BEYOND DATABASES, ARCHITECTURES AND STRUCTURES, BDAS 2016, 2016, 613 : 253 - 261