A Large-scale Analysis of Cloud Service Abuse

Naoki Fukushi
Naoki Fukushi
Masato Uchida
Masato Uchida

CNS, pp. 1-9, 2020.

Cited by: 0|Bibtex|Views5|DOI:https://doi.org/10.1109/CNS48642.2020.9162303
EI
Other Links: dblp.uni-trier.de|academic.microsoft.com

Abstract:

Cyber-attackers abuse cloud services as an infrastructure for their attacks. In a cloud service, the assigned Internet Protocol (IP) address for a server is owned by the cloud service provider. When the server is shut down, the assigned IP address is released and then assigned to another server in the same cloud service. Thus, cyber-attac...More

Code:

Data:

Your rating :
0

 

Tags
Comments