This document discusses cloud computing and its implications for cyber security. It begins with definitions of cloud computing and an overview of its key properties and benefits, such as scalability, on-demand access, and lower costs. It then explores both defensive and offensive uses of cloud computing for cyber activities. Defensively, the cloud can enable services like DDoS protection, backup and disaster recovery, and security auditing. However, attackers have also adapted malicious tools and techniques to the cloud, using its resources for activities like password cracking, botnets, and command-and-control servers. The document concludes with a case study showing how easily cyber attacks can be launched from the cloud anonymously and at low or no cost.
4. Cloud Computing Definiton
“Cloud computing is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources (e.g. ,networks,
servers, storage,applications, and services) that can be rapidly provisioned and
released with minimal management effort or service provider interaction.”
NIST
Cloud computing refers to the on-demand provision of computational
resources (data, software) via a computer network, rather than from a local
computer.
Wikipedia
4
5. • On-demand self-service
• Dynamic Resource Allocation
• Device / Location Independence
• Distributed architecture
• Scalable and Elastic
• High Computing Power
• High Bandwith
• High Storage Capacity
Cloud Characteristics
5
17. Cloud for Cyber Offense
Hacking as a Service
• Cloud properties for criminals
– Scalability,
– Quick Deployment
– Dynamic resource usage
– High computing power
– High bandwith
• Cyber criminals adapted their
tools and techniques for cloud
computing
• Unfortunately they are better at
using cloud platforms
17
18. Cloud for Cyber Offense
Cloud Usage in Cyber Offense
• DDoS as a Service
• Botnet as a Service
• Malware as a Service
• Password Cracking
• BotClouds
• C&C Servers
• Warez as a Service
18
26. • How easy it is to build cyber
attack infrastructure at cloud?
• Can we build it at no cost ?
• Can we build it anonymously?
Case Study: Cloud Based Cyber Attack
26
27. Get anonymous e-mail account
Register to cloud provider
Get free trial of cloud Linux image
Install attack software on VM
Register free DNS domain
Start attack
Large scale attack
Attack Scenario
27
28. • Known e-mail providers:
– Gmail,
– Yahoo,
– Yandex,
– Mail.ru
• One-time mail providers
– Mailinator
Attack Step 1: Get Anonymous E-mail
28
29. • Lots of cloud providers
give free trial accounts
– 1 week – 1 year trial
– Amazon
– Rackspace
– Siemens Cloud
Services
– …
Attack Step 2: Register to Cloud Provider
29
33. Attack Step 6: Launch an Attack
Possible Attacks
• Denial of Service
• Port Scanning
• Vulnerability Scan
• Exploitation
• Pshishing Site
• Malware Server
• Password Cracking
33
34. Attack Step 7: Large Scale Attacks
Creating 20 Cloud Bots
• Script for creating 20 cloud bot servers
34
35. Attack Step 7: Large Scale Attacks
Creating 1000 Cloud Bots
• Script for creating 1000 cloud bot servers
35