Cloud databases: a breeding ground for ransomware

被引:0
|
作者
Sood A.K. [1 ]
Wiley M. [1 ]
机构
[1] F5
关键词
Compendex;
D O I
10.12968/S1353-4858(23)70004-4
中图分类号
学科分类号
摘要
Attackers are targeting cloud databases to trigger ransomware infections by directly taking control of the stored data. Databases are the foundational bricks allowing us to store data and provide a uniform capability so that various applications can dynamically transact data. Compromising the data provides an edge to the attackers to extract monetary gain using stolen information. In this article, we examine the root causes of ransomware infection in cloud databases and present real-world case studies of detecting ransomware infections in Elasticsearch and MongoDB cloud instances. © 2023 MA Business Ltd.
引用
收藏
相关论文
共 50 条
  • [21] Performance Analysis in NoSQL Databases, Relational Databases and NoSQL Databases as a Service in the Cloud
    Marrero, Luciano
    Olsowy, Verena
    Tesone, Fernando
    Thomas, Pablo
    Delia, Lisandro
    Pesado, Patricia
    COMPUTER SCIENCE - CACIC 2020, 2021, 1409 : 157 - 170
  • [22] ON THE GROUND, IN THE CLOUD
    Buhmann, Mike
    Greenwalt, Toby
    Jacobsen, Mick
    Roehm, Frances
    LIBRARY JOURNAL, 2009, 134 (12) : 35 - 37
  • [23] TECHNOLOGY UPDATE: CLOUD PLATFORM Databases and cloud efficiency
    Adam, Chris
    Control Engineering, 2020, 67 (12)
  • [24] Nobel breeding ground
    Andraos, J
    CHEMICAL & ENGINEERING NEWS, 2002, 80 (40) : 4 - 4
  • [25] IN THIS BREEDING GROUND OF GESTURES
    Lartigue, Pierre
    EUROPE-REVUE LITTERAIRE MENSUELLE, 2017, (1063) : 296 - 304
  • [26] BREEDING GROUND FOR DUCKS
    不详
    NEW ZEALAND JOURNAL OF AGRICULTURE, 1970, 121 (04): : 17 - +
  • [27] Cloud as Virtual Databases: Bridging Private Databases and Web Services
    Ohshima, Hiroaki
    Oyama, Satoshi
    Tanaka, Katsumni
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT I, PROCEEDINGS, 2010, 5981 : 491 - +
  • [28] CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware
    Yun, Joobeom
    Hur, Junbeom
    Shin, Youngjoo
    Koo, Dongyoung
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (09): : 2228 - 2231
  • [29] Ransom Access Memories: Achieving Practical Ransomware Protection in Cloud with DeftPunk
    Wang, Zhongyu
    Song, Yaheng
    Xu, Erci
    Wu, Haonan
    Tong, Guangxun
    Sun, Shizhuo
    Li, Haoran
    Liu, Jincheng
    Ding, Lijun
    Liu, Rong
    Zhu, Jiaji
    Wu, Jiesheng
    PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2024, 2024, : 687 - 702
  • [30] Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services
    Lee, Kyungroul
    Lee, Jaehyuk
    Lee, Sun-Young
    Yim, Kangbin
    SENSORS, 2023, 23 (06)