Large-scale coordinated attacks : Impact ...
Document type :
Communication dans un congrès avec actes
Title :
Large-scale coordinated attacks : Impact on the cloud security
Author(s) :
Riquet, Damien [Auteur]
Extra Small Extra Safe [2XS]
Université de Lille, Sciences et Technologies
Laboratoire d'Informatique Fondamentale de Lille [LIFL]
Grimaud, Gilles [Auteur]
Extra Small Extra Safe [2XS]
Université de Lille, Sciences et Technologies
Laboratoire d'Informatique Fondamentale de Lille [LIFL]
Hauspie, Michaël [Auteur]
Extra Small Extra Safe [2XS]
Université de Lille, Sciences et Technologies
Laboratoire d'Informatique Fondamentale de Lille [LIFL]
Extra Small Extra Safe [2XS]
Université de Lille, Sciences et Technologies
Laboratoire d'Informatique Fondamentale de Lille [LIFL]
Grimaud, Gilles [Auteur]

Extra Small Extra Safe [2XS]
Université de Lille, Sciences et Technologies
Laboratoire d'Informatique Fondamentale de Lille [LIFL]
Hauspie, Michaël [Auteur]

Extra Small Extra Safe [2XS]
Université de Lille, Sciences et Technologies
Laboratoire d'Informatique Fondamentale de Lille [LIFL]
Conference title :
The Second International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2012
City :
Palermo
Country :
Italie
Start date of the conference :
2012-07-06
Publication date :
2012-07-06
English keyword(s) :
Cloud Computing
Security
Firewall
Intrusion Detection System
Distributed attacks
Portscan
Security
Firewall
Intrusion Detection System
Distributed attacks
Portscan
HAL domain(s) :
Informatique [cs]/Réseaux et télécommunications [cs.NI]
Informatique [cs]/Informatique mobile
Informatique [cs]/Système d'exploitation [cs.OS]
Informatique [cs]/Systèmes embarqués
Informatique [cs]/Informatique mobile
Informatique [cs]/Système d'exploitation [cs.OS]
Informatique [cs]/Systèmes embarqués
English abstract : [en]
Cloud Computing has emerged as a model to process large volumetric data. Though Cloud Computing is very popular, cloud security could delay its adoption. Security of the cloud must provide data confidentiality and protection ...
Show more >Cloud Computing has emerged as a model to process large volumetric data. Though Cloud Computing is very popular, cloud security could delay its adoption. Security of the cloud must provide data confidentiality and protection of resources. Such architecture seems to be vulnerable when confronted to distributed attacks also known as large-scale coordinated attacks. In this paper, we study the impact of large-scale coordinated attacks on Cloud Computing and its current security solutions. We experiment the open-source IDS Snort and a commercialized firewall using distributed portscan. Our results show that these security solutions are not designed to detect distributed attacks. Indeed, an attacker who controls about 32 hosts can easily achieve a distributed portscan without being detected.Show less >
Show more >Cloud Computing has emerged as a model to process large volumetric data. Though Cloud Computing is very popular, cloud security could delay its adoption. Security of the cloud must provide data confidentiality and protection of resources. Such architecture seems to be vulnerable when confronted to distributed attacks also known as large-scale coordinated attacks. In this paper, we study the impact of large-scale coordinated attacks on Cloud Computing and its current security solutions. We experiment the open-source IDS Snort and a commercialized firewall using distributed portscan. Our results show that these security solutions are not designed to detect distributed attacks. Indeed, an attacker who controls about 32 hosts can easily achieve a distributed portscan without being detected.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
Source :
Files
- https://hal.archives-ouvertes.fr/hal-00723739/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-00723739/file/beamer.pdf
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-00723739/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-00723739/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-00723739/document
- Open access
- Access the document
- document
- Open access
- Access the document
- 4684a558.pdf
- Open access
- Access the document
- beamer.pdf
- Open access
- Access the document
- document
- Open access
- Access the document
- 4684a558.pdf
- Open access
- Access the document
- beamer.pdf
- Open access
- Access the document