Launching Stealth Attacks using Cloud

Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated.

[1]  Akbar Siami Namin,et al.  Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy? , 2019, 2019 IEEE International Conference on Big Data (Big Data).

[2]  Ragib Hasan,et al.  Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service , 2016, IEEE Transactions on Dependable and Secure Computing.

[3]  Kim-Kwang Raymond Choo Cloud computing: Challenges and future directions , 2010 .

[4]  Ragib Hasan,et al.  FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things , 2015, 2015 IEEE International Conference on Services Computing.

[5]  Shufen Zhang,et al.  Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.

[6]  Alan T. Sherman,et al.  Design and Implementation of FROST - Digital Forensic Tools for the OpenStack Cloud Computing Platform , 2016 .

[7]  Moitrayee Chatterjee,et al.  Detecting Phishing Websites through Deep Reinforcement Learning , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).

[8]  Akbar Siami Namin,et al.  Vulnerability coverage for adequacy security testing , 2020, SAC.

[9]  Akbar Siami Namin,et al.  Abuse of the Cloud as an Attack Platform , 2020, 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC).

[10]  Vijay Varadharajan,et al.  Intrusion detection techniques in cloud environment: A survey , 2017, J. Netw. Comput. Appl..

[11]  Sara Sartoli,et al.  A semantic model for action-based adaptive security , 2017, SAC.

[12]  Akbar Siami Namin,et al.  Detecting Web Spams Using Evidence Theory , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[13]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.

[14]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .