Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 1 Class 1: Attacks taking place outside of VMs, entries in bold require the adversary to be a registered cloud customer

From: Classifying malware attacks in IaaS cloud environments

Source Target
  External Entity VM Cloud Provider
External adversary Exploit of access management fault - Exploit of cloud management design flaws
  Exploit of misconfigured API   Arbitrary code execution
  Social engineering   DoS attacks
  DoS attacks   
  Resource overuse   
  Forwarding loop in CDN(s)   
Virtual Machine - - -
Cloud Provider Data breach - Malicious insider
  Data theft   
  Data modification