Corpus ID: 7450329

Crime in the Cloud: An Analysis of the Use of Cloud Services for Cybercrime

@inproceedings{Kolthof2015CrimeIT,
  title={Crime in the Cloud: An Analysis of the Use of Cloud Services for Cybercrime},
  author={Daan Kolthof},
  year={2015}
}
  • Daan Kolthof
  • Published 2015
  • Engineering
  • With the rise of cloud computing services, cybercriminals discover new and improved ways of conducting cybercrime, using cloud services as their instrument of choice. This paper presents an overview of the misuse of cloud computing services for several malicious purposes, through a literature study and through studying real examples of misuse. Furthermore, a quantication of misuse of cloud services will be presented, for the specic case of email spam. Our study shows that there are major… CONTINUE READING

    Figures and Tables from this paper.

    Forensic Investigation Framework on Server Side of Private Cloud Computing

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 14 REFERENCES
    A survey of risks, threats and vulnerabilities in cloud computing
    • 144
    The NIST Definition of Cloud Computing
    • 11,701
    • Highly Influential
    • Open Access
    What's New About Cloud Computing Security?
    • 408
    • Open Access
    An Overview of IP Flow-Based Intrusion Detection
    • 366
    • Open Access
    A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    • 832
    • Open Access
    Botnet Command and Control Mechanisms
    • 64
    Behind Phishing: An Examination of Phisher Modi Operandi
    • 219
    • Open Access
    Anatomy of Drive-by Download Attack
    • 30
    • Open Access
    An empirical study of spam traffic and the use of DNS black lists
    • 220
    • Highly Influential
    • Open Access
    Empirical research of IP blacklists
    • 20
    • Highly Influential