You are on page 1of 8

SECURITY THREATS AND ATTACKS IN

CLOUD COMPUTING

ABSTRACT: Some attackers conduct these attacks as a


political statement. However, the main common
Cloud computing is access to remote factor in all of these attacks is that all of them are
server hosted on internet can store, data for malicious purposes. In the following section,
process and a rather than local server or we will discuss the most commonly known
personal system. And here we are discussed attacks and some mitigation techniques.
by security threats and attacks using cloud.
Security threads is a data breaches and data
loss. It is dangers of account and service
hijacking in addition to the use of insecure Data Breaches
and loss
APIs. they are different threats to availability
in cloud and the dangers of malicious Abuse of
Account or
Service
insiders. Cloud computing in security attacks Cloud Service
Hijacking
are some most common attacks in cloud Security Threats
in Cloud
computing. And they are different types of Computing
denial of service attacks and attacks on
hypervisors. In explains different attacks on Malicious
Insecure
Interfaces and
confidentiality of user data in the cloud and Insiders
APIs

resource-freeing attacks.
Threats to
Availability
This paper is discussed by security
attacks and security threads in cloud
computing. Fig.1-Types of security threads in cloud
computing
KEYWORDS: security attacks, security
threads, API, cloud computing, DoS. Security threads are identified a threat as
a potential for violation of security, which exists
INTRODUCTION:
when there is a circumstance, capability, action,
Security attacks are identified an attack or event that could breach security and cause
as an assault on system security that derives from harm. In addition to the regular threats to network
an intelligent threat, i.e., an intelligent act that is security, the unique nature of cloud computing
a deliberate attempt to evade security services creates a different type of threats that are
and violate the security policy of a system. Cloud available only in a cloud environment. For
computing, as any other platform, is a target for example, attacks on cloud components such as
many attacks. These attacks have different aims hypervisors are not available in the classic
starting from reconnaissance, to eavesdropping, network security terminology. In their “The
and all the way up to complete system failure. Notorious Nine” report, Cloud Security Alliance
(CSA) has identified nine threats that represent As this threat exists in IaaS, SaaS, and
most important threats to cloud computing PaaS service model, mitigation of it is not a
security in the year 2013 simple task. The interaction between data
breaches and data loss is delicate and the
emergency plans need to be crafted carefully.
One way of eliminating data breaches is to
Denial of encrypt all of the client data. This encryption is
Service done using a key. To keep information secure, the
Attacks
key should be with the client only and not stored
on the cloud itself. However, if the encryption
key is lost, the client would have a complete data
Attacks on Attacks on loss. Thus, the client would need to have a backup
Confidentiality Hypervisor
Security Attacks in Cloud copy of the data, somewhere else, or even off-line
Computing backup. The client should keep in mind that
having more copies of the data would potentially
increase the probability of data breaches.

Side- Resource A famous scheme was proposed in that


Channel Freeing
Attacks Attacks focuses on achieving fine-grainedness,
scalability, and data confidentiality of access
control. In this scheme, access policies based on
data attributes were defined and enforced, and, on
Fig.2-Types of security attacks in cloud the other hand, allowing the data owner to
computing delegate most of the computation tasks involved
in fine-grained data access control to untrusted
1. TYPES OF SECURITY THREADS: cloud servers without disclosing the underlying
data contents. The scheme combines techniques
of attribute-based encryption (ABE), proxy re-
1.1 Data Breaches and loss:
encryption, and lazy re-encryption. However, this
scheme was shown later on by that it is vulnerable
Every security specialist’s nightmare
to an attacked called collusion attack. A collusion
starts with a scenario that leads to having the
attack is an attack performed by are voked user
organization’s sensitive data falling in the hands
colluding with cloud server to illegally read data.
of competitors. Even one personal level, the
A technique was introduced in that
worst that can happen to you is to have your
eliminates collusion attack by dividing the data
private data publicly available for prying eyes. If
file into a header and a body to be separately
your organization provides a cloud-based service
stored to privilege manager group and cloud
to users and part of your users’ data is leaked, you
service provider. If the user is not authorized by
can say that there is a very high probability that
privilege manager group, it cannot obtain
your organization will be out of business soon. In
information regarding the data encryption key
the scenario of a poorly designed multitenant
within header, so decrypting body is completely
cloud service, a flaw in one client application
impossible.
could allow an attacker to access the data of that
client and all other clients hosted on the same
physical machine.
on cloud storage with an added security layer that
provides encryption of user data. The model also
employs version control, which can be useful in
backup scenarios. The suggested model was
implemented on Amazon S3 cloud and showed
good performance statistics.

Fig.3-life cycle of a data breach

Data loss is one of the oldest threats in


the information technology field. Reasons behind
data loss can vary depending one each network’s
design.
However, we can sum up the main causes
of data loss in the following, nonexclusive, list: Fig.4-reasons for data loss
1. Malicious attacks.
2.Natural catastrophes such as 1.2 Account or Service Hijacking
earthquakes, floods, and fires.
3. Accidental erasure or loss by the cloud Old attacks such as social
client organizations’ staff. engineering and exploiting software
4. Accidental erasure or loss by the cloud vulnerabilities are still in action. These attacks
service provider. can still achieve the intended result for a
malicious attacker. Reusing usernames and
Data loss is considered a threat to the passwords magnifies the severity of this threat.
IaaS, SaaS, and PaaS models. Mitigation of this we have discussed examples of cloud attacks
threat can be done through backups. Regular based on social engineering tricks such as spear
(daily or even hourly) off-line backups can be phishing and have shown its magnitude in attacks
used to restore data with minimum loss. For like the one on Epsilon, the cloud-based e-mail
services that have zero tolerance for data loss, service provider.
online backups with a different service provider
A new scope is added to these
can be a costly, but safe solution. In, a secure
attacks in cloud computing. The attacker, after
cloud backup system was presented. Although
gaining access to the clients credentials, can
the suggested model uses cloud storage as a
eavesdrop on the client transactions, return
backup for any system, it is possible to use it as a
falsified information, manipulate data, and even
backup for another cloud-based system. The
redirect the users to illegitimate sites. In addition
paper suggests a model where data can be stored
to that the attacker can use the instances of the
client as attacking bases to attack other people. against accidental as well as malicious attempts
Such access can compromise confidentiality, to circumvent the policy.
availability, and integrity. In 2009, Amazon had
a large number of their cloud systems hijacked 1.4 Threats to Availability
and were used to run Zeus botnet nodes. Zeus is
a banking trojan and one of its variants was Denial of service (DoS) will be
spotted using the Amazon’s cloud service as a mentioned as a threat and as a type of attack, As
command and control channel for infected a threat, DoS exists in almost all networking
machines. After the target gets tricked into services. In general, DoS is preventing the service
installing the password-logging malware, their from being provided to its intended audience.
machine began reporting to EC2 for new This can be through preventing website visitors
instruction and updates. On their side, Amazon from viewing the website, blocking legitimate
said that the trojan was using a legitimately user access to a Voice-over-IP (VoIP) server, etc.
bought service that had been compromised using
some bugs. In cloud computing, the situation is
slightly worse. DoS would not only render the
1.3 Insecure Interfaces and APIs service unavailable, but also cause huge
additional financial implications. Since cloud
For the client can manage and interact service providers charge their clients based on the
with the cloud services, the cloud service amount of resources they consume, the attacker
provider needs to provide a set of Application can cause a huge increase in the bill even if the
Programming Interfaces (APIs). These APIs are attacker did not succeed in taking the clients
used for provisioning, management, system completely down. Another point that
orchestration, and monitoring. makes this threat even more dangerous in cloud
Availability and security of the cloud computing is that cloud computing clients share
service is heavily dependent on the security of the same infrastructure. Hence, a heavy DoS
these APIs. Securing the system becomes more attack on one client can bring down the whole
complex when the organization builds on these cloud.
APIs to provide value-added services to their This threat exists in IaaS, SaaS, and PaaS
clients. This dependence on APIs shifts their models. In terms of mitigating this threat, there is
architecture into a layered model. This layered not much that can be done to prevent it. Being at
model increases risk by increasing the exposure the receiving end of a DoS attack is analogous to
area of the system. In many scenarios, the being caught in traffic lock, you cannot get to
organization will have to pass their credentials to your destination and you can do nothing about it
a third party to enable them to create or use these except waiting. The service outage becomes very
new APIs. While this threat exists on IaaS, SaaS, frustrating to clients and they start reconsidering
and PaaS models, it is essential that the clients the reasons why they moved their data to the
understand the security implications that come cloud.
with the usage, management, and monitoring of
cloud services. It is also essential to select a cloud 1.5 Malicious Insiders
service provider that provides authentication and
access control, and encryption and activity- According to [31], 62% of security
monitoring APIs that are designed to protect professionals saw increase in insider attacks. In
the same survey, 59% of security professionals
believe that privileged users such as managers due to stricter policies followed by cloud service
with access to secure data are most risky. Another providers. This threat applies to IaaS and PaaS
part of the statistics shows that 62% of security models.
professional believes that insider attacks are very The only possible way to mitigate this
difficult to detect. threat is to select a cloud service provider that has
In cloud computing, a malicious insider, strict policies related to service abuse with a
despite of the low probability of occurrence in quick response time to violations of these
comparison with external attackers, can have a policies. There is nothing technical to be done as
very high magnitude of impact. it is considered far as the client is concerned.
one of the highest possible risks on a cloud In the past few years, there have been
computing service. The reason behind that is that many examples of service abuse. As we have
cloud architectures necessitate certain roles discussed earlier in Sect.4, in 2010 a malicious
which are considered of the highest possible risk. attacker hijacked cloud services and used them to
An example of these roles is CP system deploy Zeus botnets
administrators and auditors and managed security 2. TYPES OF SECURITY ATTACKS:
service providers dealing with intrusion detection
reports and incident response. 2.1 Denial of Service Attacks
Organizations that depend solely on the DoS attacks try to render the service
service provider in security are at great risk due unavailable to its legitimate users. The attack
to malicious insiders. consumes large amounts of system resources
From IaaS to PaaS and SaaS models, the such as processing power, memory, and
malicious insider can have increasing access bandwidth. This consumption will leave the
levels to more critical data. service inaccessible to the users or intolerably
Encrypting the client data will not slow. Attackers can conduct a DoS on one or
completely mitigate this threat. If the encryption more layer of the network. DoS attack can be
keys are not stored with the client and are only executed on the physical level to render the whole
available at data usage time, the system is still
vulnerable to malicious insider attack. Thus, it is
advisable that all client data are encrypted and the
keys should be kept with the client.

1.6 Abuse of Cloud Service

For most organizations, the main reason


behind cloud computing adoption is to facilitate
low-cost high-resource solutions. These low-cost
solutions can be very beneficial to small
companies that require high computing resources
for a short period of time. On the other hand,
these services can be used by malicious attackers.
The access to these huge computing resources
can be abused and these resources can be directed Table. 1 Classification of Denial of Service
toward attacking other systems. The imminence attacks
of this threat has dropped over the past few years
Physical Machine unreachable. The attack can 2. Use of virtualized I/O devices.
also be conducted on the network layer such that 3. Minor modifications to the guest OS to
the VM is unreachable. This is done by getting perform all system discovery during
the Network Interface Card (NIC) of the server bootup.
completely occupied with useless packets in such 4.Avoidingindirectionbybringingthegues
a way that no more band wid this available for tvirtualmachineinmoredirectcontact with
legitimate users. A DoS attack can also be the underlying hardware.
launched at the transport layer using the very old,
but still effective, SYN Flood technique. In a Another mitigation technique was
SYN flood attack, the attacker sends a flood of suggested in through employing a hierarchical
TCP SYN requests that get the server busy secure virtualization model. The paper suggested
without actually completing the three-way a hierarchical model that employs a technique of
handshake procedure used in these tup of TCP threat quarantine and conquers in addition to
sessions. DoS attacks can also be launched at the complete control on virtualization. The
application level by sending fake requests to the Hierarchical Secure Virtualization Model
application layer protocol to consume the server (HSVM)introduced in the paper focuses on better
memory and processing power. isolation layering and needs to run under the
virtualization level and eventually moves up to
2.2 Attacks on Hypervisor the guest OS. The suggested model is said to be
operable in IaaS, PaaS, and SaaS cloud service
Hyper jacking was identified in as the models.
attackers attempt to craft and run a very thin
hypervisor that takes complete control of the 2.3 Resource Freeing Attacks
underlying operating system. Once the attacker
gains full control of the operating system, the When multiple VMs share the same
whole cloud is compromised. The attacker will be physical node in a cloud, the performance of any
able to eavesdrop, manipulate client data, disrupt, given VM will degrade if an other VM is over
or even shutdown the complete cloud service. using the resources. Research conducted in has
Although the probability of this attack succeeding shown that the performance of a cache-sensitive
is very low, it is still a source of concern. benchmark can degrade by more than 80%
In a novel virtualization security solution because of interference from another VM.
which aims to provide comprehensive protection The goal of the Resource Freeing Attack
of the virtualization environment was proposed. (RFA)was to modify the workload of a victim
The proposed solution has the strength of VM in a way that frees up resources for the
protected in-VM monitoring and at the same time attackers VM, given that they are sharing the
lever-ages the Linux Security same host machine. The paper explores in-depth
Module(LSM)using SELinux. The suggested a particular example of an RFA.
model is said to protect guest VMs as well as Counterintuitively, by adding load to a coresident
hypervisors from attacks. victim, the attack speeds up a class of cache-
bound workloads. The paper showed that this
The NoHype system proposed was based attack can improve performance of synthetic
on 4 main concepts: benchmarks by up to 60% over not running the
1. Pre-allocation of processor cores and attack. While in more crowded cloud
memory resources. environment such as Amazons EC2,the attack
improved the performance of the attacker’s VM VM. This is particularly possible in public
by 13%. clouds. The attacker can keep creating VMs in the
cloud until one VM is created in the same
2.4 Side-Channel Attacks physical node of the target VM. Afterward, the
attacker can start collecting information
In a side-channel attack, the attacker necessary to conduct the attack.
gains information about the cryptographic
technique currently in use through detailed 2.5 Attacks on Confidentiality
analysis of physical characteristics of the
cryptosystem’s implementation. The attacker It is a major concern for all cloud
uses information about the timing, power computing clients to secure their data. The
consumption, electro magnetic leaks, etc., to confidentiality intended by clients is not only to
exploit the system. This collected information protect their data from public attacks, but also to
can be employed in finding sensitive information protect their data from their cloud service
about the cryptographic system in use. For provider. Clients would not accept that their
example, information about power consumption service provider is capable of accessing their
can result in knowing the key used in encryption. private data whenever they want. Thus, clients
use encryption.
Confidentiality has always been a target
for security attacks since the start of computers.
In cloud computing, confidentiality is not only
about client data confidentiality. Confidentiality
is required in the cloud infrastructure as well.
Exploiting private cloud information such as
encryption keys, VM locations, or operating
system information can lead to more dangerous
attacks.
A nontechnical attack can be conducted
through social engineering. In a such attack, that
attacker can get private information such as
encryption keys, passwords, and user names by
tricking privileged users into giving access to
their accounts. There is no single specific form
Fig.5 Side Channel Attack this attack takes. It can be mostly done by the
attacker impersonating the identity of an IT-
These attacks, although being relatively support technician, system administrator, or any
easy to implementation, can result in dangerous other person that can have access to private
exploitations that can render the whole information. The best way to counter this attack
cryptosystem worthless. through educating users about the nature and
In cloud computing, side-channels shape of these attacks and sometimes additional
attacks are conducted through gaining access to institutional policies can reduce the probability of
the physical node hosting the target VM. This such attacks occurrence.
access can be available through creating a VM in
the same physical node that is hosting the target
CONCLUSION:

In this paper, to find issues from cloud


computing security. And the attacks and threads
are always tries to find new way to attack cloud it
visible at the security cover to cloud computing is
most important in this period.

REFERENCES:

1. R. Shirey, Rfc 2828: Internet security glossary,


in The Internet Society (2000)
2. A. Hussain, J. Heidemann, C. Papadopoulos,
A framework for classifying denial of service
Table 2. Confidentiality attacks
attacks, in Proceedings of the 2003 Conference
on Applications, Technologies, Architectures,
Side-channel attacks were also employed
and Protocols for Computer Communications
in but this time it was used to extract private keys
(ACM, New York, 2003)
used in client data encryption. This attack was the
3. N.Kumar,S.Sharma,Study of intrusion
first of its kinds that was demonstrated on a
detection system for DDoS attacks in cloud
symmetric multiprocessing system with Xen
computing, in 2013 Tenth International
virtualization. The attacker was able to retrieve
Conference on Wireless and Optical
encryption keys of ElGamal encryption algorithm
Communications Networks (WOCN) (IEEE,
use in the target VM. In different approach for
New York, 2013)
securing data confidentiality was introduced. The
4. M.N. Ismail, A. Aborujilah, S. Musa, A.
proposed approach uses offensive decoy
Shahzad, Detecting flooding based dos attack in
technology. The paper suggests monitoring data
cloud computing environment using covariance
access patterns. When unauthorized access is
matrix approach, in Proceedings of the 7th
suspected and then verified using challenge
International Conference on Ubiquitous
questions, a disinformation attack is launched by
Information Management and Communication
returning large amounts of decoy information to
(ACM, New York, 2013)
the attacker.
5. R. Shirey, Rfc 2828: Internet security glossary,
in The Internet Society, p. 13 (2000)
6. T.T.W.Groupetal.,The notorious nine: cloud
computing top threats in 2013,in Cloud Security
Alliance (2013)

You might also like