论文标题
使用云发射隐形攻击
Launching Stealth Attacks using Cloud
论文作者
论文摘要
云计算为用户提供可扩展的平台和低资源成本。同时,该服务模型资源的异地位置使其更容易受到某些类型的对抗动作的影响。云计算不仅获得了主要的用户群,而且还具有攻击者可以利用匿名和隐身的功能。有了方便的数据和技术访问,Cloud已将攻击平台变成了其他利用。本文报告了我们的研究表明,网络攻击者严重滥用了公共云平台,以设置其攻击环境并发起隐形攻击。本文首先回顾了通过云环境发射的攻击类型。然后,它报告了案例研究,通过这些案例研究,展示了使用云发射网络攻击的过程。
Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated.