BOTCLOUDS - The Future of Cloud-based Botnets?

Kassidy Clark, Martijn Warnier, Frances M. T. Brazier

2011

Abstract

Many Cloud Service Providers (CSP) offer access to scalable, reliable computing resources following a pay-as-you-go model. Research into security of the Cloud focusses mainly on protecting legitimate users of Cloud services from attacks by external, malicious users. Little attention is given to prohibit malicious users from using the Cloud to launch attacks, such as those currently done by botnets. These attacks include launching a DDoS attack, sending spam and perpetrating click fraud. This paper discusses the threat of Cloud-based botnets, or botclouds and the need for new techniques to detect them. Two experiments show how simple and cheaply these attacks can be launched from botclouds.

References

  1. Anselmi, D., Boscovich, R., et al. (2010). Security intelligence report. Technical Report Volume 9, Microsoft.
  2. Anselmi, D., Boscovich, R., et al. (2010). Security intelligence report. Technical Report Volume 9, Microsoft.
  3. Anthes, G. (2010). Security in the cloud. Communications of the ACM, 53(11):16-18.
  4. Anthes, G. (2010). Security in the cloud. Communications of the ACM, 53(11):16-18.
  5. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4):50-58.
  6. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4):50-58.
  7. Chandrashekar, J. (2009). The Dark Cloud: Understanding and Defending Against Botnets and Stealthy Malware. Intel R Technology Journal, 13(2).
  8. Chandrashekar, J. (2009). The Dark Cloud: Understanding and Defending Against Botnets and Stealthy Malware. Intel R Technology Journal, 13(2).
  9. Chen, Y., Paxson, V., and Katz, R. (2010). What's New About Cloud Computing Security. Technical Report Report No. UCB/EECS-2010-5, University of California, Berkeley.
  10. Chen, Y., Paxson, V., and Katz, R. (2010). What's New About Cloud Computing Security. Technical Report Report No. UCB/EECS-2010-5, University of California, Berkeley.
  11. Clayton, R. (2004). Stopping spam by extrusion detection. In First Conference on Email and Anti-Spam.
  12. Clayton, R. (2004). Stopping spam by extrusion detection. In First Conference on Email and Anti-Spam.
  13. Dagon, D., Gu, G., Lee, C., and Lee, W. (2007). A taxonomy of botnet structures. In acsac, pages 325-339. IEEE Computer Society.
  14. Dagon, D., Gu, G., Lee, C., and Lee, W. (2007). A taxonomy of botnet structures. In acsac, pages 325-339. IEEE Computer Society.
  15. Haddadi, H. (2010). Fighting online click-fraud using bluff ads. ACM SIGCOMM Computer Communication Review, 40(2):21-25.
  16. Haddadi, H. (2010). Fighting online click-fraud using bluff ads. ACM SIGCOMM Computer Communication Review, 40(2):21-25.
  17. Ianelli, N. and Hackworth, A. (2005). Botnets as a vehicle for online crime. CERT Coordination Center, pages 1-28.
  18. Ianelli, N. and Hackworth, A. (2005). Botnets as a vehicle for online crime. CERT Coordination Center, pages 1-28.
  19. Jing, L., Yang, X., Kaveh, G., Hongmei, D., and Jingyuan, Z. (2009). Botnet: Classification, attacks, detection, tracing, and preventive measures. EURASIP journal on wireless communications and networking.
  20. Jing, L., Yang, X., Kaveh, G., Hongmei, D., and Jingyuan, Z. (2009). Botnet: Classification, attacks, detection, tracing, and preventive measures. EURASIP journal on wireless communications and networking.
  21. Kshetri, N. (2010). The economics of click fraud. IEEE Security and Privacy, pages 45-53.
  22. Kshetri, N. (2010). The economics of click fraud. IEEE Security and Privacy, pages 45-53.
  23. Maggi, F. and Zanero, S. (2010). Rethinking security in a cloudy world. Technical report, Dipartimento di Elettronica e Informazione, Politecnico di Milano.
  24. Maggi, F. and Zanero, S. (2010). Rethinking security in a cloudy world. Technical report, Dipartimento di Elettronica e Informazione, Politecnico di Milano.
  25. Mirkovic, J. and Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2):39- 53.
  26. Mirkovic, J. and Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2):39- 53.
  27. Noh, S., Oh, J., Lee, J., Noh, B., and Jeong, H. (2009). Detecting P2P botnets using a multi-phased flow model. In Third IEEE International Conference on Digital Society, pages 247-253.
  28. Noh, S., Oh, J., Lee, J., Noh, B., and Jeong, H. (2009). Detecting P2P botnets using a multi-phased flow model. In Third IEEE International Conference on Digital Society, pages 247-253.
  29. Ruiter, J. and Warnier, M. (2011). Privacy regulations for cloud computing, compliance and implementation in theory and practice. In Gutwirth, S., Poullet, Y., de Hert, P., and Leenes, R., editors, Computers, Privacy and Data Protection: an Element of Choice, chapter 17, pages 293-314. Springer.
  30. Ruiter, J. and Warnier, M. (2011). Privacy regulations for cloud computing, compliance and implementation in theory and practice. In Gutwirth, S., Poullet, Y., de Hert, P., and Leenes, R., editors, Computers, Privacy and Data Protection: an Element of Choice, chapter 17, pages 293-314. Springer.
  31. Schoof, R. and Koning, R. (2007). to-peer botnets. University http://www.science.uva.nl/ 2007/p17/report.pdf.
  32. Schoof, R. and Koning, R. (2007). to-peer botnets. University http://www.science.uva.nl/ 2007/p17/report.pdf.
  33. Detecting peerof Amsterdam, delaat/sne-2006-
  34. Detecting peerof Amsterdam, delaat/sne-2006-
  35. Wilbur, K. and Zhu, Y. (2009). Click fraud. Marketing Science, 28(2):293-308.
  36. Wilbur, K. and Zhu, Y. (2009). Click fraud. Marketing Science, 28(2):293-308.
  37. Zeidanloo, H., Shooshtari, M., Amoli, P., Safari, M., and Zamani, M. (2010). A taxonomy of Botnet detection techniques. In Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, volume 2, pages 158-162. IEEE.
  38. Zeidanloo, H., Shooshtari, M., Amoli, P., Safari, M., and Zamani, M. (2010). A taxonomy of Botnet detection techniques. In Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, volume 2, pages 158-162. IEEE.
  39. Zhang, L. and Guan, Y. (2008). Detecting click fraud in pay-per-click streams of online advertising networks. In The 28th International Conference on Distributed Computing Systems, pages 77-84. IEEE.
  40. Zhang, L. and Guan, Y. (2008). Detecting click fraud in pay-per-click streams of online advertising networks. In The 28th International Conference on Distributed Computing Systems, pages 77-84. IEEE.
Download


Paper Citation


in Harvard Style

Clark K., Warnier M. and M. T. Brazier F. (2011). BOTCLOUDS - The Future of Cloud-based Botnets? . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 597-603. DOI: 10.5220/0003381305970603


in Harvard Style

Clark K., Warnier M. and M. T. Brazier F. (2011). BOTCLOUDS - The Future of Cloud-based Botnets? . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 597-603. DOI: 10.5220/0003381305970603


in Bibtex Style

@conference{closer11,
author={Kassidy Clark and Martijn Warnier and Frances M. T. Brazier},
title={BOTCLOUDS - The Future of Cloud-based Botnets?},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={597-603},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003381305970603},
isbn={978-989-8425-52-2},
}


in Bibtex Style

@conference{closer11,
author={Kassidy Clark and Martijn Warnier and Frances M. T. Brazier},
title={BOTCLOUDS - The Future of Cloud-based Botnets?},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={597-603},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003381305970603},
isbn={978-989-8425-52-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - BOTCLOUDS - The Future of Cloud-based Botnets?
SN - 978-989-8425-52-2
AU - Clark K.
AU - Warnier M.
AU - M. T. Brazier F.
PY - 2011
SP - 597
EP - 603
DO - 10.5220/0003381305970603


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - BOTCLOUDS - The Future of Cloud-based Botnets?
SN - 978-989-8425-52-2
AU - Clark K.
AU - Warnier M.
AU - M. T. Brazier F.
PY - 2011
SP - 597
EP - 603
DO - 10.5220/0003381305970603