【24h】

AmazonIA: When Elasticity Snaps Back

机译:Amazonia:弹性扣篮时

获取原文
获取外文期刊封面目录资料

摘要

Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud computing in the last years. The literature on clouds often points out security and privacy challenges as the main obstacles, and proposes solutions and guidelines to avoid them. However, most of these works deal with either malicious cloud providers or customers, but ignore the severe threats caused by unaware users. In this paper we consider security and privacy aspects of real-life cloud deployments, independently from malicious cloud providers or customers. We focus on the popular Amazon Elastic Compute Cloud (EC2) and give a detailed and systematic analysis of various crucial vulnerabilities in publicly available and widely used Amazon Machine Images (AMIs) and show how to eliminate them. Our Amazon Image Attacks (AmazonIA) deploy an automated tool that uses only publicly available interfaces and makes no assumptions on the underlying cloud infrastructure. We were able to extract highly sensitive information (including passwords, keys, and credentials) from a variety of publicly available AMIs. The extracted information allows to (i) start (botnet) instances worth thousands of dollars per day, (ii) provide backdoors into the running machines, (iii) launch impersonation attacks, or (iv) access the source code of the entire web service. Our attacks can be used to completely compromise several real web services offered by companies (including IT-security companies), e.g., for website statistics/user tracking, two-factor authentication, or price comparison. Further, we show mechanisms to identify the AMI of certain running instances. Following the maxim "security and privacy by design" we show how our automated tools together with changes to the user interface can be used to mitigate our attacks.
机译:云计算是一个新兴技术,有希望的新商机和轻松部署Web服务。在过去几年云计算的风险和好处是众多。云上的文献经常将安全性和隐私挑战视为主要障碍,并提出了解决方案和指导方针来避免它们。然而,这些工作中的大多数都与恶意云提供商或客户协议,但忽略了不知用户造成的严重威胁。在本文中,我们考虑了真实云部署的安全和隐私方面,独立于恶意云提供商或客户。我们专注于流行的亚马逊弹性计算云(EC2),并在公开和广泛使用的亚马逊机器图像(AMIS)中对各种关键漏洞进行详细和系统的分析,并显示如何消除它们。我们的亚马逊图像攻击(Amazonia)部署了仅使用公共可用接口的自动工具,并在底层云基础架构上没有假设。我们能够从各种公开的AMI中提取高度敏感的信息(包括密码,钥匙和凭据)。提取的信息允许(i)开始(僵尸网络)每天价值数千美元的开始(ii)在运行机,(iii)启动模拟攻击,或(iv)访问整个Web服务的源代码。我们的攻击可以使用由公司提供的完全妥协几个真正的Web服务(包括IT安全公司),例如,对网站的统计/用户跟踪,双因素认证,或价格比较。此外,我们显示了识别某些运行实例的AMI的机制。在Maxim“通过设计的安全和隐私”之后,我们展示了我们的自动化工具如何以及用户界面的更改可以用于减轻我们的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号