DeepAI AI Chat
Log In Sign Up

Launching Stealth Attacks using Cloud

by   Moitrayee Chatterjee, et al.
Texas Tech University

Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated.


page 5

page 6


A Slow Read attack Using Cloud

Cloud computing relies on sharing computing resources rather than having...

Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks

Cloud computing paradigms have emerged as a major facility to store and ...

A next-generation platform for Cyber Range-as-a-Service

In the last years, Cyber Ranges have become a widespread solution to tra...

Cloud as an Attack Platform

We present an exploratory study of responses from 75 security profession...

Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires

Rapidly-changing cloud environments that consist of heavily interconnect...

Evacuação de Dados em Nuvens Ópticas com base no SLA sob Cenário de Desastre

The popularization of cloud computing has provided the emergence of larg...