Skip to main content
Article
Analysis of cloud computing attacks and countermeasures
International Conference on Advanced Communication Technology, ICACT
  • Raja Mohamed Jabir, Zayed University
  • Salam Ismail Rasheed Khanji, Zayed University
  • Liza Abdallah Ahmad, Zayed University
  • Omar Alfandi, Zayed University
  • Huwida Said, Zayed University
Document Type
Conference Proceeding
Publication Date
3-1-2016
Abstract

© 2016 Global IT Research Institute (GiRI). Business enterprises are competing to get their applications up and running faster with improved manageability and less maintenance by reassigning the ability to IT specialists to adjust resources in order to meet business fluctuating needs. This can be achieved through utilizing the Cloud Computing Model which is distinguished by 'pay as you go' model. The model offers solutions of storage, convenient and on-demand access to a shared pool of configurable computing resources. As with any novel technology, Cloud Computing is subject to security threats and vulnerabilities including network threats, information threats and underlying infrastructure threats. In this paper, we present a framework by which penetration testing is conducted to highlight possible vulnerabilities within our private Cloud Computing infrastructure, simulate attacks to exploit discovered vulnerabilities such as Denial of Service (DoS) and Man-in-the-Cloud attacks, apply countermeasures to prevent such attacks, and then to exemplify a recommended best practice protection mechanism which will contribute to the Cloud Computing security.

ISBN
9788996865063
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Disciplines
Keywords
  • Cloud Computing,
  • DDOS,
  • Man in the Cloud,
  • OpenStack
Scopus ID
84962856946
Indexed in Scopus
Yes
Open Access
No
https://doi.org/10.1109/ICACT.2016.7423296
Citation Information
Raja Mohamed Jabir, Salam Ismail Rasheed Khanji, Liza Abdallah Ahmad, Omar Alfandi, et al.. "Analysis of cloud computing attacks and countermeasures" International Conference on Advanced Communication Technology, ICACT Vol. 2016-March (2016) p. 117 - 123 ISSN: <a href="https://v2.sherpa.ac.uk/id/publication/issn/1738-9445" target="_blank">1738-9445</a>
Available at: http://works.bepress.com/liza-ahmad/1/