Cloud: A Platform To Launch Stealth Attacks

被引:0
|
作者
Chatterjee, Moitrayee [1 ]
Datta, Prerit [1 ]
Abri, Faranak [1 ]
Namin, Akbar Siami [1 ]
Jones, Keith S. [2 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[2] Texas Tech Univ, Dept Psychol Sci, Lubbock, TX 79409 USA
基金
美国国家科学基金会;
关键词
Cloud Abuse; Cloud Forensics; Attacker Mental Model; IaaS Cloud; Stealth Attack;
D O I
10.1109/COMPSAC48688.2020.00-33
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated. We simulated various attacks using a virtualized environment, similar to cloud platforms, to identify the possible countermeasures from a defender's perspective, and thus to provide implications for the cloud service providers.
引用
收藏
页码:1558 / 1563
页数:6
相关论文
共 50 条
  • [21] Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation
    Sun, Ke
    Esnaola, Inaki
    Tulino, Antonia. M. M.
    Poor, H. Vincent
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (04) : 3189 - 3200
  • [22] Discovering Hackers by Stealth: Predicting Fingerprinting Attacks on Honeypot Systems
    Naik, Nitin
    Jenkins, Paul
    2018 4TH IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (ISSE), 2018,
  • [23] Stability Investigation of DC Microgrids Under Stealth Cyber Attacks
    Leng, Minrui
    Sahoo, Subham
    Blaabjerg, Frede
    2021 IEEE ENERGY CONVERSION CONGRESS AND EXPOSITION (ECCE), 2021, : 1427 - 1432
  • [24] Sustainability of Service Provisioning Systems Under Stealth DoS Attacks
    Paschos, Georgios S.
    Tassiulas, Leandros
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (04): : 749 - 760
  • [25] Stealth Attacks and Protection Schemes for State Estimators in Power Systems
    Dan, Gyorgy
    Sandberg, Henrik
    2010 IEEE 1ST INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2010, : 214 - 219
  • [26] Covert Channels-Based Stealth Attacks in Industry 4.0
    Alcaraz, Cristina
    Bernieri, Giuseppe
    Pascucci, Federica
    Lopez, Javier
    Setola, Roberto
    IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3980 - 3988
  • [27] Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks
    Nasser, Ahmad M. K.
    Ma, Di
    Lauzon, Sam
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 73 - 86
  • [28] Immunomodulating Hydrogels as Stealth Platform for Drug Delivery Applications
    Rezaei, Zahra
    Yilmaz-Aykut, Dilara
    Tourk, Fatima Mumtaza
    Bassous, Nicole
    Barroso-Zuppa, Margot
    Shawl, Asif Iqbal
    Ashraf, Syed Salman
    Avci, Huseyin
    Hassan, Shabir
    PHARMACEUTICS, 2022, 14 (10)
  • [29] Modeling an Enterprise Environment for Testing OpenStack Cloud Platform against Low-rate DDoS Attacks
    Florea, Razvan
    Craus, Mitica
    2022 26TH INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2022, : 146 - 151
  • [30] Extenuate DDoS Attacks in Cloud
    Kiranmai, B.
    Damodaram, A.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 235 - 238