Advances, Systems and Applications
From: Classifying malware attacks in IaaS cloud environments
Source | Target | ||
---|---|---|---|
External Entity | VM | Cloud Provider | |
External adversary | Exploit of access management fault | - | Exploit of cloud management design flaws |
Exploit of misconfigured API | Arbitrary code execution | ||
Social engineering | DoS attacks | ||
DoS attacks | |||
Resource overuse | |||
Forwarding loop in CDN(s) | |||
Virtual Machine | - | - | - |
Cloud Provider | Data breach | - | Malicious insider |
Data theft | |||
Data modification |