SlideShare une entreprise Scribd logo
1  sur  36
11 Haziran 2015
Cloud Computing v.s. Cyber Security
Bahtiyar BİRCAN
TOBB-ETU
bahtiyarb@gmail.com
Agenda
Cloud Computing Definition
Cloud Properties and Benefits
Cloud Computing fo Cyber Defense
Cloud Computing for Cyber Offense
Case Study: Cloud Based Cyber Attack
2
Cloud Computing
Cloud Computing Definiton
“Cloud computing is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources (e.g. ,networks,
servers, storage,applications, and services) that can be rapidly provisioned and
released with minimal management effort or service provider interaction.”
NIST
Cloud computing refers to the on-demand provision of computational
resources (data, software) via a computer network, rather than from a local
computer.
Wikipedia
4
• On-demand self-service
• Dynamic Resource Allocation
• Device / Location Independence
• Distributed architecture
• Scalable and Elastic
• High Computing Power
• High Bandwith
• High Storage Capacity
Cloud Characteristics
5
Cloud Computing Benefits
6
Cloud Models
7
Cloud for Cyber Defense
• DDoS Protection
• Web Application Attack Prevention
• Backup and Disaster Recovery
• Vulnerability Scan
• Penetration Testing & Security Audit
• Log Managamenet / SIEM
• Forensics as a Service
Cloud Usage for Cyber Defense
9
DDoS Protection
Cloud Based DDoS Protection Services
• CloudFlare, Incapsula
10
Web Application Attack Prevention
11
Vulnerability Scanning
12
Vulnerability Scanning
13
Penetration Testing & Security Audit
14
Forensics as a Service
15
Cloud for Cyber Offense
Cloud for Cyber Offense
Hacking as a Service
• Cloud properties for criminals
– Scalability,
– Quick Deployment
– Dynamic resource usage
– High computing power
– High bandwith
• Cyber criminals adapted their
tools and techniques for cloud
computing
• Unfortunately they are better at
using cloud platforms
17
Cloud for Cyber Offense
Cloud Usage in Cyber Offense
• DDoS as a Service
• Botnet as a Service
• Malware as a Service
• Password Cracking
• BotClouds
• C&C Servers
• Warez as a Service
18
DDoS as a Service
19
Source: McAfee
Botnet as a Service
20Source: McAfee
Malware as a Service
21
Source: Solutionary
Password Cracking as a Service
Password Cracking Experiment
• Lentgth: 1-6 character
• Algorithm: SHA1
• Method: Brute Force
• Hardware:
– Amazon cg1.4xlarge
– 22 GB memory
– 2 x Intel Xeon X5570, quad-core
– 2 x NVIDIA Tesla M2050 GPUs
– 1690 GB of instance storage
• Crack time: 49 min
• Price: 2100 $
22
Password Cracking as a Service
23
Command & Control Servers
24
Case Study:
Cloud Based Cyber Attack
• How easy it is to build cyber
attack infrastructure at cloud?
• Can we build it at no cost ?
• Can we build it anonymously?
Case Study: Cloud Based Cyber Attack
26
Get anonymous e-mail account
Register to cloud provider
Get free trial of cloud Linux image
Install attack software on VM
Register free DNS domain
Start attack
Large scale attack
Attack Scenario
27
• Known e-mail providers:
– Gmail,
– Yahoo,
– Yandex,
– Mail.ru
• One-time mail providers
– Mailinator
Attack Step 1: Get Anonymous E-mail
28
• Lots of cloud providers
give free trial accounts
– 1 week – 1 year trial
– Amazon
– Rackspace
– Siemens Cloud
Services
– …
Attack Step 2: Register to Cloud Provider
29
Attack Step 3: Get a Trial of Linux VM Image
30
Attack Step 4: Install Attack Software on VM
31
Attack Step 5: Register Free DNS Domain
32
Attack Step 6: Launch an Attack
Possible Attacks
• Denial of Service
• Port Scanning
• Vulnerability Scan
• Exploitation
• Pshishing Site
• Malware Server
• Password Cracking
33
Attack Step 7: Large Scale Attacks
Creating 20 Cloud Bots
• Script for creating 20 cloud bot servers
34
Attack Step 7: Large Scale Attacks
Creating 1000 Cloud Bots
• Script for creating 1000 cloud bot servers
35
Thanks
Bahtiyar BİRCAN
TOBB-ETU
bahtiyarb@gmail.com

Contenu connexe

Tendances

Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computingUday Wankar
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Akhila Param
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Lee Newcombe, Capgemini “Security threats associated with cloud computing”Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Lee Newcombe, Capgemini “Security threats associated with cloud computing”Chris Purrington
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityPiyush Mittal
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Services
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responsesshafzonly
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environmentShivam Singh
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 

Tendances (20)

Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Lee Newcombe, Capgemini “Security threats associated with cloud computing”Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environment
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 

En vedette

Energy conservation week celebration
Energy conservation week celebrationEnergy conservation week celebration
Energy conservation week celebrationSudha Arun
 
Data Warehouse Optimization
Data Warehouse OptimizationData Warehouse Optimization
Data Warehouse OptimizationCloudera, Inc.
 
CUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce ClusterCUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce Clusterairbots
 
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...Dr.Choen Krainara
 
Making Display Advertising Work for Auto Dealers
Making Display Advertising Work for Auto DealersMaking Display Advertising Work for Auto Dealers
Making Display Advertising Work for Auto DealersSpeed Shift Media
 
Real-World Data Governance: Data Governance Roles & Responsibilities
Real-World Data Governance: Data Governance Roles & ResponsibilitiesReal-World Data Governance: Data Governance Roles & Responsibilities
Real-World Data Governance: Data Governance Roles & ResponsibilitiesDATAVERSITY
 
Top 10 heavy duty diesel mechanic interview questions and answers
Top 10 heavy duty diesel mechanic interview questions and answersTop 10 heavy duty diesel mechanic interview questions and answers
Top 10 heavy duty diesel mechanic interview questions and answerstonychoper8206
 
Seminar datawarehousing
Seminar datawarehousingSeminar datawarehousing
Seminar datawarehousingKavisha Uniyal
 
Lab Report on copper cycle
 Lab Report on copper cycle  Lab Report on copper cycle
Lab Report on copper cycle Karanvir Sidhu
 
Equity derivatives
Equity derivativesEquity derivatives
Equity derivativesRahul Sane
 
How to perform an efficient Cold Chain Compliance and Gap Analysis
How to perform an efficient Cold Chain Compliance and Gap Analysis How to perform an efficient Cold Chain Compliance and Gap Analysis
How to perform an efficient Cold Chain Compliance and Gap Analysis Alternatives Technologie Pharma
 
Financial Management Best Practices
Financial Management Best PracticesFinancial Management Best Practices
Financial Management Best PracticesAutotask
 
AWS 클라우드 서비스 소개 및 사례 (방희란) - AWS 101 세미나
AWS 클라우드 서비스 소개 및 사례 (방희란) - AWS 101 세미나AWS 클라우드 서비스 소개 및 사례 (방희란) - AWS 101 세미나
AWS 클라우드 서비스 소개 및 사례 (방희란) - AWS 101 세미나Amazon Web Services Korea
 
Consulting Company Valuation Model
Consulting Company Valuation ModelConsulting Company Valuation Model
Consulting Company Valuation ModelTony Rice
 
Lecture 1 introduction to construction procurement process.
Lecture 1   introduction to construction procurement process.Lecture 1   introduction to construction procurement process.
Lecture 1 introduction to construction procurement process.Aszahari Aie
 
Bài 1: Làm quen với ASP.NET - Giáo trình FPT - Có ví dụ kèm theo
Bài 1: Làm quen với ASP.NET - Giáo trình FPT - Có ví dụ kèm theoBài 1: Làm quen với ASP.NET - Giáo trình FPT - Có ví dụ kèm theo
Bài 1: Làm quen với ASP.NET - Giáo trình FPT - Có ví dụ kèm theoMasterCode.vn
 
Energy management final ppt
Energy management final pptEnergy management final ppt
Energy management final pptEcoEvents
 
Top 10 electrical project engineer interview questions and answers
Top 10 electrical project engineer interview questions and answersTop 10 electrical project engineer interview questions and answers
Top 10 electrical project engineer interview questions and answersrobin26331
 
Energy management system
Energy management systemEnergy management system
Energy management systemkashbhat
 

En vedette (20)

Energy conservation week celebration
Energy conservation week celebrationEnergy conservation week celebration
Energy conservation week celebration
 
Data Warehouse Optimization
Data Warehouse OptimizationData Warehouse Optimization
Data Warehouse Optimization
 
CUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce ClusterCUDA performance study on Hadoop MapReduce Cluster
CUDA performance study on Hadoop MapReduce Cluster
 
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...
Export-Oriented Industrialization (EOI): Arguments For and Against What Have ...
 
Making Display Advertising Work for Auto Dealers
Making Display Advertising Work for Auto DealersMaking Display Advertising Work for Auto Dealers
Making Display Advertising Work for Auto Dealers
 
Real-World Data Governance: Data Governance Roles & Responsibilities
Real-World Data Governance: Data Governance Roles & ResponsibilitiesReal-World Data Governance: Data Governance Roles & Responsibilities
Real-World Data Governance: Data Governance Roles & Responsibilities
 
Top 10 heavy duty diesel mechanic interview questions and answers
Top 10 heavy duty diesel mechanic interview questions and answersTop 10 heavy duty diesel mechanic interview questions and answers
Top 10 heavy duty diesel mechanic interview questions and answers
 
Seminar datawarehousing
Seminar datawarehousingSeminar datawarehousing
Seminar datawarehousing
 
Lab Report on copper cycle
 Lab Report on copper cycle  Lab Report on copper cycle
Lab Report on copper cycle
 
Equity derivatives
Equity derivativesEquity derivatives
Equity derivatives
 
How to perform an efficient Cold Chain Compliance and Gap Analysis
How to perform an efficient Cold Chain Compliance and Gap Analysis How to perform an efficient Cold Chain Compliance and Gap Analysis
How to perform an efficient Cold Chain Compliance and Gap Analysis
 
Financial Management Best Practices
Financial Management Best PracticesFinancial Management Best Practices
Financial Management Best Practices
 
AWS 클라우드 서비스 소개 및 사례 (방희란) - AWS 101 세미나
AWS 클라우드 서비스 소개 및 사례 (방희란) - AWS 101 세미나AWS 클라우드 서비스 소개 및 사례 (방희란) - AWS 101 세미나
AWS 클라우드 서비스 소개 및 사례 (방희란) - AWS 101 세미나
 
Churn management
Churn managementChurn management
Churn management
 
Consulting Company Valuation Model
Consulting Company Valuation ModelConsulting Company Valuation Model
Consulting Company Valuation Model
 
Lecture 1 introduction to construction procurement process.
Lecture 1   introduction to construction procurement process.Lecture 1   introduction to construction procurement process.
Lecture 1 introduction to construction procurement process.
 
Bài 1: Làm quen với ASP.NET - Giáo trình FPT - Có ví dụ kèm theo
Bài 1: Làm quen với ASP.NET - Giáo trình FPT - Có ví dụ kèm theoBài 1: Làm quen với ASP.NET - Giáo trình FPT - Có ví dụ kèm theo
Bài 1: Làm quen với ASP.NET - Giáo trình FPT - Có ví dụ kèm theo
 
Energy management final ppt
Energy management final pptEnergy management final ppt
Energy management final ppt
 
Top 10 electrical project engineer interview questions and answers
Top 10 electrical project engineer interview questions and answersTop 10 electrical project engineer interview questions and answers
Top 10 electrical project engineer interview questions and answers
 
Energy management system
Energy management systemEnergy management system
Energy management system
 

Similaire à Cloud Computing v.s. Cyber Security

Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptxssuser0fc2211
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02abhisheknayak29
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computingDeep Gupta
 
Skip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized appsSkip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized appsHaidee McMahon
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITPeter HJ van Eijk
 
Agility and Cloud Computing - Voices 2015
Agility and Cloud Computing - Voices 2015Agility and Cloud Computing - Voices 2015
Agility and Cloud Computing - Voices 2015Deanna Kosaraju
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersGokul Alex
 
Trend and Future of Cloud Computing
Trend and Future of Cloud ComputingTrend and Future of Cloud Computing
Trend and Future of Cloud Computinghybrid cloud
 
12-cloud-security.ppt
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.pptchelsi33
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016Shannon Lietz
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Clould Computing and its application in Libraries
Clould Computing and its application in LibrariesClould Computing and its application in Libraries
Clould Computing and its application in LibrariesAmit Shaw
 
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Shivananda Rai
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
Introduction to Cloud computing
Introduction to Cloud computing Introduction to Cloud computing
Introduction to Cloud computing mehanasshahul
 
Cloud Computing - The new buzz word
Cloud Computing - The new buzz wordCloud Computing - The new buzz word
Cloud Computing - The new buzz wordQuadrisk
 

Similaire à Cloud Computing v.s. Cyber Security (20)

Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
Skip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized appsSkip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized apps
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
4831586.ppt
4831586.ppt4831586.ppt
4831586.ppt
 
Agility and Cloud Computing - Voices 2015
Agility and Cloud Computing - Voices 2015Agility and Cloud Computing - Voices 2015
Agility and Cloud Computing - Voices 2015
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
Trend and Future of Cloud Computing
Trend and Future of Cloud ComputingTrend and Future of Cloud Computing
Trend and Future of Cloud Computing
 
12-cloud-security.ppt
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.ppt
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Clould Computing and its application in Libraries
Clould Computing and its application in LibrariesClould Computing and its application in Libraries
Clould Computing and its application in Libraries
 
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
 
Jjm cloud computing
Jjm cloud computingJjm cloud computing
Jjm cloud computing
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Introduction to Cloud computing
Introduction to Cloud computing Introduction to Cloud computing
Introduction to Cloud computing
 
Cloud Computing - The new buzz word
Cloud Computing - The new buzz wordCloud Computing - The new buzz word
Cloud Computing - The new buzz word
 

Dernier

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 

Dernier (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

Cloud Computing v.s. Cyber Security

  • 1. 11 Haziran 2015 Cloud Computing v.s. Cyber Security Bahtiyar BİRCAN TOBB-ETU bahtiyarb@gmail.com
  • 2. Agenda Cloud Computing Definition Cloud Properties and Benefits Cloud Computing fo Cyber Defense Cloud Computing for Cyber Offense Case Study: Cloud Based Cyber Attack 2
  • 4. Cloud Computing Definiton “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. ,networks, servers, storage,applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” NIST Cloud computing refers to the on-demand provision of computational resources (data, software) via a computer network, rather than from a local computer. Wikipedia 4
  • 5. • On-demand self-service • Dynamic Resource Allocation • Device / Location Independence • Distributed architecture • Scalable and Elastic • High Computing Power • High Bandwith • High Storage Capacity Cloud Characteristics 5
  • 8. Cloud for Cyber Defense
  • 9. • DDoS Protection • Web Application Attack Prevention • Backup and Disaster Recovery • Vulnerability Scan • Penetration Testing & Security Audit • Log Managamenet / SIEM • Forensics as a Service Cloud Usage for Cyber Defense 9
  • 10. DDoS Protection Cloud Based DDoS Protection Services • CloudFlare, Incapsula 10
  • 11. Web Application Attack Prevention 11
  • 14. Penetration Testing & Security Audit 14
  • 15. Forensics as a Service 15
  • 16. Cloud for Cyber Offense
  • 17. Cloud for Cyber Offense Hacking as a Service • Cloud properties for criminals – Scalability, – Quick Deployment – Dynamic resource usage – High computing power – High bandwith • Cyber criminals adapted their tools and techniques for cloud computing • Unfortunately they are better at using cloud platforms 17
  • 18. Cloud for Cyber Offense Cloud Usage in Cyber Offense • DDoS as a Service • Botnet as a Service • Malware as a Service • Password Cracking • BotClouds • C&C Servers • Warez as a Service 18
  • 19. DDoS as a Service 19 Source: McAfee
  • 20. Botnet as a Service 20Source: McAfee
  • 21. Malware as a Service 21 Source: Solutionary
  • 22. Password Cracking as a Service Password Cracking Experiment • Lentgth: 1-6 character • Algorithm: SHA1 • Method: Brute Force • Hardware: – Amazon cg1.4xlarge – 22 GB memory – 2 x Intel Xeon X5570, quad-core – 2 x NVIDIA Tesla M2050 GPUs – 1690 GB of instance storage • Crack time: 49 min • Price: 2100 $ 22
  • 23. Password Cracking as a Service 23
  • 24. Command & Control Servers 24
  • 25. Case Study: Cloud Based Cyber Attack
  • 26. • How easy it is to build cyber attack infrastructure at cloud? • Can we build it at no cost ? • Can we build it anonymously? Case Study: Cloud Based Cyber Attack 26
  • 27. Get anonymous e-mail account Register to cloud provider Get free trial of cloud Linux image Install attack software on VM Register free DNS domain Start attack Large scale attack Attack Scenario 27
  • 28. • Known e-mail providers: – Gmail, – Yahoo, – Yandex, – Mail.ru • One-time mail providers – Mailinator Attack Step 1: Get Anonymous E-mail 28
  • 29. • Lots of cloud providers give free trial accounts – 1 week – 1 year trial – Amazon – Rackspace – Siemens Cloud Services – … Attack Step 2: Register to Cloud Provider 29
  • 30. Attack Step 3: Get a Trial of Linux VM Image 30
  • 31. Attack Step 4: Install Attack Software on VM 31
  • 32. Attack Step 5: Register Free DNS Domain 32
  • 33. Attack Step 6: Launch an Attack Possible Attacks • Denial of Service • Port Scanning • Vulnerability Scan • Exploitation • Pshishing Site • Malware Server • Password Cracking 33
  • 34. Attack Step 7: Large Scale Attacks Creating 20 Cloud Bots • Script for creating 20 cloud bot servers 34
  • 35. Attack Step 7: Large Scale Attacks Creating 1000 Cloud Bots • Script for creating 1000 cloud bot servers 35