Major attacks on Cloud Computing with countermeasures. 

Posted by

Cloud computing is one of the most important newer developments in the information systems.The primary concern that

gets the organizations to adopt the Cloud Computing technology is cost reduction through optimized and proficient processing,  however, there are different vulnerabilities and dangers in Cloud Computing that influence its security.

 

ATTACKS ON CLOUD  COMPUTING WITH COUNTERMEASURES:

By exploring vulnerabilities in Cloud, an adversary can launch the following attacks:

CLOUD ZOMBIE ATTACK :

Zombie attack is one of the advanced attacks in Cloud Computing environment which degrades the performance and throughput of the network.

Through the Internet, an attacker tries to surge the casualty by sending demands from innocent hosts in the network. These types of hosts are called zombies. Zombie is used by malicious users to launch DOS or DOS attacks. This type of attack interrupts the normal behavior of Cloud affecting the availability of Cloud services.

 

Figure 1: Zombie attack

 

The solutions of Cloud Zombie Attack :

  1. Firewall – Firewall can be used to allow or deny access to the requests.
  2. Intrusion detection system and intrusion prevention system.
  3. Better authentication and authorization.
  4. The combination of DOS attack detection, classification of traffic and response tools.

CLOUD MALWARE INJECTION ATTACK :

In this type of attack,  the attacker attempts to inject an implementation of a malicious service or virtual machine into the Cloud. If the attacker is successful, then the Cloud will suffer from eavesdropping.

The purpose of malware Cloud could be anything that the adversary is interested in – possibly data modification, full functionality change or blocking.

Among all of the malware injection attacks, SQL injection attack and cross-site scripting attack are the two most common forms.

254201112458.jpeg
Figure 2: Malware Injection Attack

The solution of Cloud Malware Injection Attack :

For this purpose, we need to deploy a Hypervisor in the provider’s end. This Hypervisor will be considered the most secure and sophisticated part of the cloud system whose security cannot be breached by any means. The Hypervisor is responsible for scheduling all the instances, but before scheduling, it will check the integrity of the instance from the FAT table of the customer’s VM.

 

In the next post, we’ll discuss Distributed Denial of Service Attack on Cloud Computing.

Advertisements

3 comments

  1. Hello There. I’m really happy you enjoyed “Deep Learning”. It’s long, maybe laborious, maybe boring but I feel a very important subject if you are in the STEM professions. Also, to me, it’s fascinating. Thank you so much for your very kind attention. Take care.

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s