Skip to main content

Advances, Systems and Applications

Table 1 Class 1: Attacks taking place outside of VMs, entries in bold require the adversary to be a registered cloud customer

From: Classifying malware attacks in IaaS cloud environments

Source

Target

 

External Entity

VM

Cloud Provider

External adversary

Exploit of access management fault

-

Exploit of cloud management design flaws

 

Exploit of misconfigured API

 

Arbitrary code execution

 

Social engineering

 

DoS attacks

 

DoS attacks

  
 

Resource overuse

  
 

Forwarding loop in CDN(s)

  

Virtual Machine

-

-

-

Cloud Provider

Data breach

-

Malicious insider

 

Data theft

  
 

Data modification