期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Cloud repository as a malicious service:challenge,identification and implication
1
作者 Xiaojing Liao Sumayah Alrwais +4 位作者 Kan Yuan Luyi Xing XiaoFeng Wang Shuang Hao Raheem Beyah 《Cybersecurity》 2018年第1期245-262,共18页
The popularity of cloud hosting services also brings in new security chal-lenges:it has been reported that these services are increasingly utilized by miscreants for their malicious online activities.Mitigating this e... The popularity of cloud hosting services also brings in new security chal-lenges:it has been reported that these services are increasingly utilized by miscreants for their malicious online activities.Mitigating this emerging threat,posed by such“bad repositories”(simply Bar),is challenging due to the different hosting strategy to traditional hosting service,the lack of direct observations of the repositories by those outside the cloud,the reluctance of the cloud provider to scan its customers’repositories without their consent,and the unique evasion strategies employed by the adversary.In this paper,we took the first step toward understanding and detecting this emerging threat.Using a small set of“seeds”(i.e.,confirmed Bars),we identified a set of collective features from the websites they serve(e.g.,attempts to hide Bars),which uniquely characterize the Bars.These features were utilized to build a scanner that detected over 600 Bars on leading cloud platforms like Amazon,Google,and 150 K sites,including popular ones like groupon.com,using them.Highlights of our study include the pivotal roles played by these repositories on malicious infrastructures and other important discoveries include how the adversary exploited legitimate cloud repositories and why the adversary uses Bars in the first place that has never been reported.These findings bring such malicious services to the spotlight and contribute to a better understanding and ultimately eliminating this new threat. 展开更多
关键词 CLOUD CYBERCRIME malicious hosting service
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部