14 Most Common Cloud Security Attacks and Counter Measures
14 Most Common Cloud Security Attacks and Counter Measures
14 Most Common Cloud Security Attacks and Counter Measures
C
loud is an emerging technology, offering numerous benefits to organizations of all sizes, such
as reduced IT costs, scalability, efficiency, flexibility, etc. But it comes with its drawbacks,
mainly in the form of security threats and vulnerabilities.
Unlike traditional solutions where perils come from two known sources, either inside or outside the
network, security threats in cloud computing can originate from different levels: application, network,
and user levels.
In this post, we will look at different types of attacks at these three levels: cloud service provider
(CSP) level, network level, and user or host level, and the ways to reduce their damage.
1. SQL injection
An unauthorized user gains access to the entire database of an application by inserting malicious
code into a standard SQL code. Often used to attack websites, SQL injection can be avoided by the
usage of dynamically generated SQL in the code. It is also necessary to remove all stored procedures
that are rarely used and assign the least possible privileges to users who have permission to access
the database.
2. Guest-hopping attack
In guest-hopping attacks, due to the separation failure between shared infrastructures, an attacker
gets access to a virtual machine by penetrating another virtual machine hosted in the same
hardware. One possible mitigation of guest-hopping attack is the Forensics and VM debugging tools to
observe any attempt to compromise the virtual machine. Another solution is to use the High
Assurance Platform (HAP), which provides a high degree of isolation between virtual machines.
3. Side-channel attack
An attacker opens a side-channel attack by placing a malicious virtual machine on the same physical
machine as the victim machine. Through this, the attacker gains access to all confidential information
on the victim machine. The countermeasure to eliminate the risk of side-channel attacks in a
virtualized cloud environment is to ensure that no legitimate user VMs reside on the same hardware
of other users.
4. Malicious insider
A malicious insider can be a current or former employee or business associate who maliciously and
intentionally abuses system privileges and credentials to access and steal sensitive customer
information within the network of an organization. Strict privilege planning and security auditing can
minimize this security risk that originates from within an organization.
https://roboticsbiz.com/14-most-common-critical-cloud-security-attacks-and-countermeasures/ 1/4
2/15/2021 14 most common cloud security attacks and counter measures
5. Cookie poisoning
Cookie poisoning means to gain unauthorized access into an application or a webpage by modifying
the contents of the cookie. In a SaaS model, cookies contain user identity credential information that
allows the applications to authenticate the user identity. Cookies are forged to impersonate an
authorized user. A solution is to clean up the cookie and encrypt the cookie data.
9. ARP poisoning
Address Resolution Protocol (ARP) poisoning is when an attacker exploits some ARP protocol
weakness to map a network IP address to one malicious MAC and then update the ARP cache with
this malicious MAC address. It is better to use static ARP entries to minimize this attack. This tactic
can work for small networks such as personal clouds, but it is easier to use other strategies such as
port security features on large-scale clouds to lock a single port (or network device) to a particular IP
address.
https://roboticsbiz.com/14-most-common-critical-cloud-security-attacks-and-countermeasures/ 2/4
2/15/2021 14 most common cloud security attacks and counter measures
telephony, and more. It includes TCP SYN Flood Attacks, UDP Flood Attack, Spoofed Source
Address/LAND Attacks, Cache Poisoning Attacks, and Man in the Middle Attacks.
12. IP Spoofing
In IP spoofing, an attacker gains unauthorized access to a computer by pretending that the traffic has
originated from a legitimate computer. IP spoofing is used for other threats such as Denial of Service
and Middle Attack Man:
It is a type of attack that tries to make a website or network resource unavailable. The attacker
floods the host with a massive number of packets in a short amount of time that require extra
processing. It makes the targeted device waste time waiting for a response that never comes. The
target is kept so busy dealing with malicious packets that it does not respond to routine incoming
requests, leaving the legitimate users with denied service.
An attacker can coordinate hundreds of devices across the Internet to send an overwhelming amount
of unwanted packets to a target. Therefore, tracking and stopping DoS is very difficult. TCP SYN
flooding is an example of a DoS attack in which the intruder sends a flood of spoofed TCP SYN
packets to the victim machine. This attack exploits the limitations of the three-way handshake in
maintaining half-open connections.
A man-in-the-middle attack (MITM) is an intrusion in which the intruder relays remotely or probably
changes messages between two entities that think they communicate directly with each other. The
intruder utilizes network packet sniffer, filtering, and transmission protocols to gain access to network
traffic. MITM attack exploits the real-time processing of transactions, conversations, or transfer of
other data. It can be reduced using packet filtering by firewall, secure encryption, and origin
authentication techniques.
Another method of phishing is to send an email to the user claiming to be from the cloud service
company or, for instance, to tell the user to provide their username and password for maintenance
https://roboticsbiz.com/14-most-common-critical-cloud-security-attacks-and-countermeasures/ 3/4
2/15/2021 14 most common cloud security attacks and counter measures
purposes. Countermeasures of phishing are the use of Spam filters and spam blockers in the
browsers. You can also train the users not to respond to any spoofed email and not to give their
credentials to any website.
https://roboticsbiz.com/14-most-common-critical-cloud-security-attacks-and-countermeasures/ 4/4