Corpus ID: 7450329

Crime in the Cloud: An Analysis of the Use of Cloud Services for Cybercrime

@inproceedings{Kolthof2015CrimeIT,
  title={Crime in the Cloud: An Analysis of the Use of Cloud Services for Cybercrime},
  author={Daan Kolthof},
  year={2015}
}
  • Daan Kolthof
  • Published 2015
  • Engineering
  • With the rise of cloud computing services, cybercriminals discover new and improved ways of conducting cybercrime, using cloud services as their instrument of choice. This paper presents an overview of the misuse of cloud computing services for several malicious purposes, through a literature study and through studying real examples of misuse. Furthermore, a quantication of misuse of cloud services will be presented, for the specic case of email spam. Our study shows that there are major… CONTINUE READING
    1 Citations

    Figures and Tables from this paper.

    Forensic Investigation Framework on Server Side of Private Cloud Computing

    References

    SHOWING 1-10 OF 14 REFERENCES
    A survey of risks, threats and vulnerabilities in cloud computing
    • 146
    Botnet Command and Control Mechanisms
    • 65
    What's New About Cloud Computing Security?
    • 410
    • PDF
    An Overview of IP Flow-Based Intrusion Detection
    • 375
    • PDF
    Anatomy of Drive-by Download Attack
    • 30
    • PDF
    Empirical research of IP blacklists
    • 20
    • Highly Influential
    A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    • 856
    • PDF
    Behind Phishing: An Examination of Phisher Modi Operandi
    • 225
    • PDF
    An empirical study of spam traffic and the use of DNS black lists
    • 223
    • Highly Influential
    • PDF
    The NIST Definition of Cloud Computing
    • 11,903
    • Highly Influential
    • PDF