Cloud Security: Attacks, Techniques, Tools, and Challenges
- Length: 240 pages
- Edition: 1
- Language: English
- Publisher: Chapman and Hall/CRC
- Publication Date: 2021-12-28
- ISBN-10: 0367435829
- ISBN-13: 9780367435820
- Sales Rank: #0 (See Top 100 Books)
Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity.
Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security
The book offers comprehensive coverage of the most essential topics, including:
- Basic fundamentals of Cloud Computing
- Cloud security concepts, vulnerabilities, security standards and reference models
- Cloud security goals, key issues and privacy requirements
- Threat model, detailed taxonomy of cloud attacks, Attack feature analysis – case study
- A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS)
- Attack and security tools, LibVMI – case study
- Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI)
- Container security: threat model, attacks and defense systems
This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools.
Cover Half Title Title Page Copyright Page Dedication Contents Preface Acknowledgment List of Figures List of Tables Author Bios I. Fundamentals: Cloud Computing and Security 1. Introduction to Cloud Computing 1.1. Introduction 1.2. History and Underlying Technologies 1.2.1. Mainframe computing 1.2.2. Cluster computing 1.2.3. Grid computing 1.2.4. Distributed and parallel computing 1.2.5. Virtualization 1.2.6. Web 2.0 1.2.7. Service-oriented computing (SOC) 1.2.8. Utility computing 1.3. Definitions and Characteristics 1.4. Cloud Service Models 1.4.1. Software-as-a-service (SaaS) 1.4.2. Platform-as-a-service (PaaS) 1.4.3. Infrastructure-as-a-service (IaaS) 1.5. Cloud Deployment Models 1.5.1. Private cloud 1.5.2. Public cloud 1.5.3. Community cloud 1.5.4. Hybrid cloud 1.6. Cloud Service Platforms 1.6.1. Amazon web service (AWS) 1.6.2. Microsoft azure 1.6.3. Google cloud platform 1.6.4. IBM cloud 1.6.5. Adobe creative cloud 1.6.6. Kamatera 1.6.7. VMware 1.6.8. Rackspace 1.7. Challenges Ahead 1.7.1. Virtual machine migration 1.7.2. Interoperability and standards 1.7.3. Security and privacy 1.7.4. Energy management 1.7.5. Accessibility issues 1.8. Conclusion 1.9. Questions 2. Introduction to Cloud Security 2.1. Introduction 2.1.1. Vulnerabilities present in cloud 2.1.2. Need of cloud security 2.2. Cloud Security Concepts 2.2.1. Multi-tenancy 2.2.2. Virtualization 2.2.3. Data outsourcing 2.2.4. Trust management 2.2.5. Metadata security 2.3. Cloud Security Standards 2.3.1. Information technology infrastructure library (ITIL) 2.3.2. Control objectives for information and related technology (COBIT) 2.3.3. ISO/IEC 20000 2.3.4. Statement on standards for attestation engagement (SSAE) 2.3.5. Cloud security alliance (CSA) cloud controls matrix 2.4. CSA Cloud Reference Model 2.5. NIST Cloud Reference Model 2.5.1. Architectural components of consumer 2.5.2. Architectural components of CSP 2.5.3. Architectural components of broker 2.5.4. Architectural components of carrier 2.5.5. Architectural components of auditor 2.6. Conclusion 2.7. Questions 3. Cloud Security and Privacy Issues 3.1. Introduction 3.2. Cloud Security Goals/Concepts 3.2.1. Confidentiality 3.2.2. Integrity 3.2.3. Availability 3.2.4. Authentication 3.2.5. Authorization 3.2.6. Auditing 3.2.7. Access control 3.3. Cloud Security Issues 3.3.1. Application level security issues 3.3.2. Network level security issues 3.3.3. Virtualization level security issues 3.3.4. Data security 3.3.5. Identity management and access control 3.3.6. Improper cryptographic keys management 3.3.7. Service level agreement (SLA) 3.3.8. Regular audit and compliances 3.3.9. Cloud and CSP migration, SLA and trust level issues 3.3.10. Hardware-level security issues 3.4. Security Requirements for Privacy 3.4.1. Fine-grained access control 3.4.2. Privacy-preserving 3.4.3. Collision resistance 3.5. Privacy Issues in Cloud 3.5.1. Defining roles to actors 3.5.2. Compliance 3.5.3. Legal issues and multi-location issues 3.5.4. Privacy issues on CIA 3.5.5. Protection of the data 3.5.6. User control lacking 3.5.7. Data movement 3.6. Conclusion 3.7. Questions II. Threat Model, Attacks, Defense Systems, and Security Techniques 4. Threat Model and Cloud Attacks 4.1. Introduction 4.2. Threat Model 4.2.1. Type of attack entities 4.2.2. Attack surfaces with attack scenarios 4.3. A Taxonomy of Attacks 4.3.1. VMAT: Virtual machines-level attacks 4.3.2. VMMAT: Virtual machine monitor-level attacks 4.3.3. HWAT: Peripheral–level attacks 4.3.4. VSWAT: Virtual storage-level attacks 4.3.5. TENAT: Tenant network-level attacks 4.4. Case Study: Description of Features for Attack Analysis Based on Dataset 4.4.1. Fuzzers 4.4.2. Analysis 4.4.3. Backdoor 4.4.4. Exploits 4.4.5. Generic 4.4.6. Reconnaissance 4.4.7. Shellcode 4.4.8. Worms 4.5. Conclusion 4.6. Questions 5. Classification of Intrusion Detection Systems in Cloud 5.1. Introduction 5.2. TVM-based Intrusion Detection System 5.3. Hypervisor-based Intrusion Detection System 5.4. Network-based Intrusion Detection System 5.5. Distributed Intrusion Detection System 5.6. Research Challenges 5.7. Conclusion 5.8. Questions 6. Intrusion Detection Techniques in Cloud 6.1. Introduction 6.2. Taxonomy of IDS Techniques 6.2.1. Misuse detection techniques 6.2.2. Anomaly detection techniques 6.2.3. Virtual machine introspection (VMI) techniques 6.2.4. Hypervisor introspection-based techniques 6.2.5. Hybrid techniques 6.3. Conclusion 6.4. Questions III. Tools and Advances 7. Overview of Tools (Attack/Security) in Cloud 7.1. Introduction 7.2. Attack Tools 7.2.1. Network-level attack tools 7.2.2. VM-level attack tools 7.2.3. VMM attack tools 7.3. Security Tools 7.3.1. Network security tools 7.3.2. VM security tool 7.3.3. VMM security tools 7.4. Case Study of LibVMI: A Virtualziation-Specific Tool 7.4.1. Check the system configurations 7.4.2. Install KVM and necessary dependencies 7.4.3. Creating a virtual machine 7.4.4. Install LibVMI tool and necessary dependencies 7.5. Conclusion 7.6. Questions 8. Virtual Machine Introspection and Hypervisor Introspection 8.1. Introduction 8.2. Virtual Machine Introspection (VMI) 8.2.1. VM hook based 8.2.2. VM-state information based 8.2.3. Hypercall verification based 8.2.4. Guest OS kernel debugging based 8.2.5. VM interrupt analysis based 8.3. Hypervisor Introspection (HVI) 8.3.1. Nested virtualization 8.3.2. Code integrity checking using hardware-support 8.3.3. Memory integrity checking using hardware/software support 8.3.4. Revisiting the VMM design 8.3.5. VM-assisted hypervisor introspection 8.4. Conclusion 8.5. Questions 9. Container Security 9.1. Introduction 9.2. Threat Model in Containerized Environment 9.2.1. Attacks in containers 9.3. Defense Mechanisms 9.4. Case Study on SQL Injection Attack in Containers 9.4.1. Part-A-test bed set up 9.4.2. PART B: Attacking launching and malicious logs extraction 9.5. Open Research Challenges for Container Security 9.6. Conclusion 9.7. Questions Bibliography Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.