{"title":"从内部人员的角度攻击云","authors":"Johannes Bouché, Martin Kappes","doi":"10.1109/ITECHA.2015.7317391","DOIUrl":null,"url":null,"abstract":"In this paper, we study how an insider such as, the administrator of a cloud service provider, can compromise guest machines in a IaaS cloud structure in order to obtain data from the guests and even achieve code execution. Moreover, we present results obtained by the implementation of such attacks. In general, our results show that cloud infrastructures are susceptible to various types of attacks. Therefore, the choice of a trustworthy service provider is paramount when using public cloud infrastructures.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"21 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Attacking the cloud from an insider perspective\",\"authors\":\"Johannes Bouché, Martin Kappes\",\"doi\":\"10.1109/ITECHA.2015.7317391\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we study how an insider such as, the administrator of a cloud service provider, can compromise guest machines in a IaaS cloud structure in order to obtain data from the guests and even achieve code execution. Moreover, we present results obtained by the implementation of such attacks. In general, our results show that cloud infrastructures are susceptible to various types of attacks. Therefore, the choice of a trustworthy service provider is paramount when using public cloud infrastructures.\",\"PeriodicalId\":161782,\"journal\":{\"name\":\"2015 Internet Technologies and Applications (ITA)\",\"volume\":\"21 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Internet Technologies and Applications (ITA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITECHA.2015.7317391\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Internet Technologies and Applications (ITA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITECHA.2015.7317391","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we study how an insider such as, the administrator of a cloud service provider, can compromise guest machines in a IaaS cloud structure in order to obtain data from the guests and even achieve code execution. Moreover, we present results obtained by the implementation of such attacks. In general, our results show that cloud infrastructures are susceptible to various types of attacks. Therefore, the choice of a trustworthy service provider is paramount when using public cloud infrastructures.