作者: Moitrayee Chatterjee , Prerit Datta , Faranak Abri , Akbar Siami Namin , Keith S. Jones
DOI: 10.1109/COMPSAC48688.2020.00-33
关键词:
摘要: Cloud computing offers users scalable platforms and low resource cost. At the same time, off-site location of resources this service model makes it more vulnerable to certain types adversarial actions. has not only gained major user base, but also, features that attackers can leverage remain anonymous stealth. With convenient access data technology, cloud turned into an attack platform among other utilization. This paper reports our study show cyber heavily abuse public setup their environments launch stealth attacks. The first reviews attacks launched through environment. It then case studies which processes launching using clouds are demonstrated. We simulated various a virtualized environment, similar platforms, identify possible countermeasures from defender's perspective, thus provide implications for providers.