Publications

Quantifying cloud misbehavior

Abstract

Clouds have gained popularity over the years as they provide on-demand resources without associated long-term costs. Cloud users often gain superuser access to cloud machines, which is necessary to customize them to user needs. But superuser access to a vast amount of resources, without support or oversight of experienced system administrators, can create fertile ground for accidental or intentional misuse. Attackers can rent cloud machines or hijack them from cloud users, and leverage them to generate unwanted traffic, such as spam and phishing, denial of service, vulnerability scans, drive-by downloads, etc. In this paper, we analyze 13 datasets, containing various types of unwanted traffic, to quantify cloud misbehavior and identify clouds that most often and most aggressively generate unwanted traffic. We find that although clouds own only 5.4% of the routable IPv4 address space (with 94.6% going to …

Metadata

publication
2020 IEEE 9th International Conference on Cloud Networking (CloudNet), 1-8, 2020
year
2020
publication date
2020/11/9
authors
Rajat Tandon, Jelena Mirkovic, Pithayuth Charnsethikul
link
https://ieeexplore.ieee.org/abstract/document/9335812/
resource_link
https://www.isi.edu/people-mirkovic/wp-content/uploads/sites/52/2023/10/cloudnet2020.pdf
conference
2020 IEEE 9th International Conference on Cloud Networking (CloudNet)
pages
1-8
publisher
IEEE