Cloud: A Platform To Launch Stealth Attacks

被引:0
|
作者
Chatterjee, Moitrayee [1 ]
Datta, Prerit [1 ]
Abri, Faranak [1 ]
Namin, Akbar Siami [1 ]
Jones, Keith S. [2 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[2] Texas Tech Univ, Dept Psychol Sci, Lubbock, TX 79409 USA
基金
美国国家科学基金会;
关键词
Cloud Abuse; Cloud Forensics; Attacker Mental Model; IaaS Cloud; Stealth Attack;
D O I
10.1109/COMPSAC48688.2020.00-33
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated. We simulated various attacks using a virtualized environment, similar to cloud platforms, to identify the possible countermeasures from a defender's perspective, and thus to provide implications for the cloud service providers.
引用
收藏
页码:1558 / 1563
页数:6
相关论文
共 50 条
  • [1] STEALTH VIRUS ATTACKS
    DEHAVEN, J
    BYTE, 1993, 18 (06): : 137 - &
  • [2] Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers
    Palmieri, Francesco
    Ficco, Massimo
    Castiglione, Aniello
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 265 - 272
  • [3] The feasibility and inevitability of stealth attacks
    Tyukin, Ivan Y.
    Higham, Desmond J.
    Bastounis, Alexander
    Woldegeorgis, Eliyas
    Gorban, Alexander N.
    IMA JOURNAL OF APPLIED MATHEMATICS, 2023, 89 (01) : 44 - 84
  • [4] Stealth Attacks on the Smart Grid
    Sun, Ke
    Esnaola, Inaki
    Perlaza, Samir M.
    Poor, H. Vincent
    IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (02) : 1276 - 1285
  • [5] LEARNING REQUIREMENTS FOR STEALTH ATTACKS
    Sun, Ke
    Esnaola, Inaki
    Tulino, Antonia M.
    Poor, H. Vincent
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 8102 - 8106
  • [6] Stealth attacks in vehicular technologies
    Jakobsson, M
    Wang, XF
    Wetzel, S
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 1218 - 1222
  • [7] Launch platform
    Smith, BA
    AVIATION WEEK & SPACE TECHNOLOGY, 2001, 155 (08): : 19 - 19
  • [8] Platform Launch Strategies
    Stummer, Christian
    Kundisch, Dennis
    Decker, Reinhold
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2018, 60 (02): : 167 - 173
  • [9] Platform Launch Strategies
    Christian Stummer
    Dennis Kundisch
    Reinhold Decker
    Business & Information Systems Engineering, 2018, 60 : 167 - 173
  • [10] 'Odyssey' - the launch platform
    不详
    MER-MARINE ENGINEERS REVIEW, 1998, : 37 - 37