Increasing Attacks on Cloud Platforms

1300 Words6 Pages
STUDENT NUMBER: 066275 CLOUD COMPUTING SECURITY TERM PAPER TWO Living with Increasing Attacks on Cloud Computing Platforms Cloud Computing is an on demand, flexible and cost friendly delivery platform that has provided IT consumers and organizations services such as networks, storage, servers and applications over the Internet. Its importance is increasing as a large number of industrial and technological communities are rapidly adopting it. The benefits such as low cost and convenience of cloud computing services have significantly changed our day to days activities, however, there are numerous security issues facing cloud computing making it difficult to maintain data security and privacy, support data and service availability and…show more content…
Flooding attacks are also performed by hackers where they send numerous bogus offers and request for help to a target machine rendering services blocked from users trying to access them. The two types of attacks that would result from flooding attack in cloud include direct DoS and indirect DoS. When a cloud server receives a large volume of flooded requests, it will provide more computational resources to cope with the malicious requests. The server then exhausts its full capability and a direct DoS is occurred to all requests from users. However, the flood attack could possibly cause indirect DoS to other servers in the same cloud when the servers share the workload of the targeted server, which results a full lack of availability on all of the services. Cloud Security Attacks Web-based applications enable users to access application servers via web pages of web browsers. Wrapping attacks and malware injection attack is one of the various web-based attacks where an attacker exploits the vulnerabilities in a web application and attach malicious codes into it resulting to a variation in its proper execution. Cloud computing systems are also susceptible to malware injection attacks. The attacker develops a malicious program or application and inject them into target cloud service model such as SaaS, PaaS or IaaS. Once the injection is successful, the malicious module is executed as one of the valid instances running in the cloud; then, the hacker can do
Open Document