A Large-scale Analysis of Cloud Service Abuse
CNS, pp. 1-9, 2020.
EI
Abstract:
Cyber-attackers abuse cloud services as an infrastructure for their attacks. In a cloud service, the assigned Internet Protocol (IP) address for a server is owned by the cloud service provider. When the server is shut down, the assigned IP address is released and then assigned to another server in the same cloud service. Thus, cyber-attac...More
Code:
Data:
Tags
Comments