Cloud: A Platform To Launch Stealth Attacks

被引:0
|
作者
Chatterjee, Moitrayee [1 ]
Datta, Prerit [1 ]
Abri, Faranak [1 ]
Namin, Akbar Siami [1 ]
Jones, Keith S. [2 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[2] Texas Tech Univ, Dept Psychol Sci, Lubbock, TX 79409 USA
基金
美国国家科学基金会;
关键词
Cloud Abuse; Cloud Forensics; Attacker Mental Model; IaaS Cloud; Stealth Attack;
D O I
10.1109/COMPSAC48688.2020.00-33
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated. We simulated various attacks using a virtualized environment, similar to cloud platforms, to identify the possible countermeasures from a defender's perspective, and thus to provide implications for the cloud service providers.
引用
收藏
页码:1558 / 1563
页数:6
相关论文
共 50 条
  • [31] Solutions for DDoS Attacks on Cloud
    Bhardwaj, Akashdeep
    Subrahmanyam, G. V. B.
    Avasthi, Vinay
    Sastry, Hanumat G.
    2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016, : 163 - 167
  • [32] Preventing Insider Attacks in the Cloud
    Sundararajan, Sudharsan
    Narayanan, Hari
    Pavithran, Vipin
    Vorungati, Kaladhar
    Achuthan, Krishnashree
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 488 - +
  • [33] SECURITY THREATS AND ATTACKS IN CLOUD
    Mohammed, Asma
    Al Khathami, Jamilah
    Alhakami, Wajdi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (01): : 184 - 191
  • [34] Cloud Attacks Detection System for Cloud Load Balancing
    Sambangi, Swathi
    Gondi, Lakshmeeswari
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 729 - 740
  • [35] Failure to Launch: Critical Mass in Platform Businesses
    Evans, David S.
    Schmalensee, Richard
    REVIEW OF NETWORK ECONOMICS, 2010, 9 (04)
  • [36] Japan to start station work with launch of platform
    Aviat Week Space Technol (New York), 11 (110):
  • [37] Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems
    Heseding, Hauke
    Dieing, Moritz
    Meshram, Ankush
    Zitterbart, Martina
    2023 IEEE 21ST INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, INDIN, 2023,
  • [38] BLE Launch of the Dialog Platform for sustainable Nutrition
    不详
    FLEISCHWIRTSCHAFT, 2022, 102 (02): : 56 - 56
  • [39] Execution at RISC: Stealth JOP Attacks on RISC-V Applications
    Buckwell, Loic
    Gilles, Olivier
    Perez, Daniel Gracia
    Kosmatov, Nikolai
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 377 - 391
  • [40] A Platform for Cloud Robotics
    do Nascimento, Amadeu, Jr.
    Cardozo, Eleri
    Souza, Ricardo S.
    Guimaraes, Eliane G.
    IFAC PAPERSONLINE, 2016, 49 (30): : 48 - 53