Cloud: A Platform to Launch Stealth Attacks

作者: Moitrayee Chatterjee , Prerit Datta , Faranak Abri , Akbar Siami Namin , Keith S. Jones

DOI: 10.1109/COMPSAC48688.2020.00-33

关键词:

摘要: Cloud computing offers users scalable platforms and low resource cost. At the same time, off-site location of resources this service model makes it more vulnerable to certain types adversarial actions. has not only gained major user base, but also, features that attackers can leverage remain anonymous stealth. With convenient access data technology, cloud turned into an attack platform among other utilization. This paper reports our study show cyber heavily abuse public setup their environments launch stealth attacks. The first reviews attacks launched through environment. It then case studies which processes launching using clouds are demonstrated. We simulated various a virtualized environment, similar platforms, identify possible countermeasures from defender's perspective, thus provide implications for providers.

参考文章(11)
Kim-Kwang Raymond Choo, Cloud Computing: Challenges and Future Directions Trends and issues in crime and criminal justice. ,vol. 2010, pp. 1- 6 ,(2010)
Shams Zawoad, Ragib Hasan, FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things 2015 IEEE International Conference on Services Computing. pp. 279- 284 ,(2015) , 10.1109/SCC.2015.46
Josiah Dykstra, Alan T. Sherman, Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform Digital Investigation. ,vol. 10, pp. S87- S95 ,(2013) , 10.1016/J.DIIN.2013.06.010
Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan, A survey on security issues and solutions at different layers of Cloud computing The Journal of Supercomputing. ,vol. 63, pp. 561- 592 ,(2013) , 10.1007/S11227-012-0831-5
Shuai Zhang, Shufen Zhang, Xuebin Chen, Xiuzhen Huo, Cloud Computing Research and Development Trend international conference on future networks. pp. 93- 97 ,(2010) , 10.1109/ICFN.2010.58
Peter Mell, Tim Grance, The NIST Definition of Cloud Computing Special Publication (NIST SP) - 800-145. ,vol. 23, pp. 50- 50 ,(2011) , 10.6028/NIST.SP.800-145
Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Tupakula, Intrusion detection techniques in cloud environment Journal of Network and Computer Applications. ,vol. 77, pp. 18- 47 ,(2017) , 10.1016/J.JNCA.2016.10.015
Sara Sartoli, Akbar Siami Namin, A semantic model for action-based adaptive security symposium on applied computing. pp. 1130- 1135 ,(2017) , 10.1145/3019612.3019755
Faranak Abri, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin, Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy? 2019 IEEE International Conference on Big Data (Big Data). pp. 3252- 3259 ,(2019) , 10.1109/BIGDATA47090.2019.9006514
Shuvalaxmi Dass, Akbar Siami Namin, Vulnerability coverage for adequacy security testing acm symposium on applied computing. pp. 540- 543 ,(2020) , 10.1145/3341105.3374099