Cloud as an Attack Platform

06/14/2020
by   Moitrayee Chatterjee, et al.
0

We present an exploratory study of responses from 75 security professionals and ethical hackers in order to understand how they abuse cloud platforms for attack purposes. The participants were recruited at the Black Hat and DEF CON conferences. We presented the participants' with various attack scenarios and asked them to explain the steps they would have carried out for launching the attack in each scenario. Participants' responses were studied to understand attackers' mental models, which would improve our understanding of necessary security controls and recommendations regarding precautionary actions to circumvent the exploitation of clouds for malicious activities. We observed that in 93.78 establish their attack environment and launch attacks.

READ FULL TEXT

page 1

page 2

page 3

research
06/14/2020

Launching Stealth Attacks using Cloud

Cloud computing offers users scalable platforms and low resource cost. A...
research
05/29/2019

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks

Despite the fact that cyberattacks are constantly growing in complexity,...
research
12/26/2022

Users really do respond to smishing

Text phish messages, referred to as Smishing is a type of social enginee...
research
05/25/2022

The security of the Coordicide: the implementation and analysis of possible attack vectors

The goal of the thesis is to study and perform an analysis of the possib...
research
04/24/2019

Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition

Homograph attack is a way that attackers deceive victims about which dom...
research
12/09/2022

Reconfigurable Intelligent Surfaces: The New Frontier of Next G Security

RIS is one of the significant technological advancements that will mark ...
research
04/06/2007

Empirical analysis and statistical modeling of attack processes based on honeypots

Honeypots are more and more used to collect data on malicious activities...

Please sign up or login with your details

Forgot password? Click here to reset