Back to Search
Start Over
An empirical investigation of botnet as a service for cyberattacks.
- Source :
- Transactions on Emerging Telecommunications Technologies; Mar2019, Vol. 30 Issue 3, pN.PAG-N.PAG, 1p
- Publication Year :
- 2019
-
Abstract
- During the last years, cloud computing has emerged and imposed itself as a cost‐effective solution for providing high quality Information Technology services. However, beyond a legitimate usage, the benefits of cloud computing are being exploited by attackers in nefarious ways and botnets are among the greatest beneficiaries of this malicious use. This botnet trend is a major issue because it strongly increases the power of massive distributed attacks when leveraging the capabilities of cloud service providers that do not have appropriate detection approaches in place to detect botnets exploiting cloud resources (also referred to as botclouds). We developed a free experimental intra–Cloud Service Provider (CSP) botnet that exploits CSPs' trial versions. We used this intra‐CSP botnet to execute numerous TCP SYN flood and UDP flood attacks during one week. Our empirical results demonstrate that, contrary to what CSPs claim, all the CSPs (with the exception of one) we have tested still cannot detect or issued no warnings when malicious activities were launched from their cloud computing platforms. Besides, CSP's trial versions can easily be exploited to perpetrate large scale cyberattacks. We argue that efficient, cost‐effective, scalable detection approaches that can detect botclouds need to be developed in the future to address this challenge. We demonstrate through empirical tests how it is easy to build a botnet using cloud services and to demonstrate the inability of CSPs in detecting malicious usage of their resources which will motivate researchers to explore novel security solutions to address this important issue. This study conducted a large‐scale experimentation during which we used various trial versions offered by CSPs in order to build an intra‐CSP botnet. We used the latter to launch DDoS attacks against a controlled target server. [ABSTRACT FROM AUTHOR]
- Subjects :
- EMPIRICAL research
CYBERTERRORISM
INFORMATION technology
CLOUD computing
MALWARE
Subjects
Details
- Language :
- English
- ISSN :
- 21613915
- Volume :
- 30
- Issue :
- 3
- Database :
- Complementary Index
- Journal :
- Transactions on Emerging Telecommunications Technologies
- Publication Type :
- Academic Journal
- Accession number :
- 135403969
- Full Text :
- https://doi.org/10.1002/ett.3537