Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Launching Stealth Attacks using Cloud (2006.07908v1)

Published 14 Jun 2020 in cs.CR and cs.NI

Abstract: Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (5)
  1. Moitrayee Chatterjee (4 papers)
  2. Prerit Datta (4 papers)
  3. Faranak Abri (13 papers)
  4. Akbar Siami Namin (29 papers)
  5. Keith S. Jones (10 papers)

Summary

We haven't generated a summary for this paper yet.