Cloud: A Platform to Launch Stealth Attacks

Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated. We simulated various attacks using a virtualized environment, similar to cloud platforms, to identify the possible countermeasures from a defender's perspective, and thus to provide implications for the cloud service providers.

Original languageEnglish
Title of host publicationProceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020
EditorsW. K. Chan, Bill Claycomb, Hiroki Takakura, Ji-Jiang Yang, Yuuichi Teranishi, Dave Towey, Sergio Segura, Hossain Shahriar, Sorel Reisman, Sheikh Iqbal Ahamed
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1558-1563
Number of pages6
ISBN (Electronic)9781728173030
DOIs
StatePublished - Jul 2020
Event44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020 - Virtual, Madrid, Spain
Duration: Jul 13 2020Jul 17 2020

Publication series

NameProceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020

Conference

Conference44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020
Country/TerritorySpain
CityVirtual, Madrid
Period07/13/2007/17/20

Keywords

  • Attacker Mental Model
  • Cloud Abuse
  • Cloud Forensics
  • IaaS Cloud
  • Stealth Attack

Fingerprint

Dive into the research topics of 'Cloud: A Platform to Launch Stealth Attacks'. Together they form a unique fingerprint.

Cite this