Cloud: A Platform To Launch Stealth Attacks

被引:0
|
作者
Chatterjee, Moitrayee [1 ]
Datta, Prerit [1 ]
Abri, Faranak [1 ]
Namin, Akbar Siami [1 ]
Jones, Keith S. [2 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[2] Texas Tech Univ, Dept Psychol Sci, Lubbock, TX 79409 USA
基金
美国国家科学基金会;
关键词
Cloud Abuse; Cloud Forensics; Attacker Mental Model; IaaS Cloud; Stealth Attack;
D O I
10.1109/COMPSAC48688.2020.00-33
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated. We simulated various attacks using a virtualized environment, similar to cloud platforms, to identify the possible countermeasures from a defender's perspective, and thus to provide implications for the cloud service providers.
引用
收藏
页码:1558 / 1563
页数:6
相关论文
共 50 条
  • [41] A Survey on Data Integrity Attacks and DDoS Attacks in Cloud Computing
    Tian, Yun
    Nogales, Andres F. Romero
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 788 - 794
  • [42] Researches on Brittle Seam Mining based Situation Assessment and Prediction Mechanism of DDoS Attacks in Cloud Computing Platform
    Zhuo, Yi
    Yao, Shijun
    Liang, Wang
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 262 - 270
  • [43] vmiTLP: A Security Protocol Towards a Trusted Launch Process of a User Generic Virtual Machine Image on a Public Cloud IaaS Platform
    Balmany, M. El
    Asimi, Ahmed
    Tbatou, Dr.
    IAENG International Journal of Computer Science, 2022, 49 (01) : 166 - 176
  • [44] A Stealth Migration Approach to Moving Target Defense in Cloud Computing
    Das, Saikat
    Mahfouz, Ahmed M.
    Shiva, Sajjan
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 1, 2020, 1069 : 394 - 410
  • [45] Stealth magnetic nanocarriers of siRNA as platform for breast cancer theranostics
    Bruniaux, J.
    Ben Djemaa, S.
    Herve-Aubert, K.
    Marchais, H.
    Chourpa, I.
    David, S.
    INTERNATIONAL JOURNAL OF PHARMACEUTICS, 2017, 532 (02) : 660 - 668
  • [46] Detecting selective forwarding attacks on cloud
    Wang, Haozhen
    Wang, Yuhang
    Wu, Yuanming
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 137
  • [47] Detecting Denial of Service Attacks in the Cloud
    Kumar, Raneel
    Lal, Sunil Pranit
    Sharma, Alok
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 309 - 316
  • [48] An Approach for Preventing and Detecting Attacks in the Cloud
    Merino, Louis-Henri
    Cukier, Michel
    2020 IEEE/ACM 13TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2020), 2020, : 165 - 175
  • [49] Analysis of Cloud Computing Attacks and Countermeasures
    Jabir, Raja Mohamed
    Khanji, Salam Ismail Rasheed
    Ahmad, Liza Abdallah
    Alfandi, Omar
    Said, Huwida
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 117 - 123
  • [50] Terrorist attacks cloud manufacturers' prospects
    Anon
    Quarry Management, 2001, 28 (12):