2022
DOI: 10.48550/arxiv.2204.05122
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Measuring and Mitigating the Risk of IP Reuse on Public Clouds

Abstract: Public clouds provide scalable and cost-efficient computing through resource sharing. However, moving from traditional on-premises service management to clouds introduces new challenges; failure to correctly provision, maintain, or decommission elastic services can lead to functional failure and vulnerability to attack. In this paper, we explore a broad class of attacks on clouds which we refer to as cloud squatting. In a cloud squatting attack, an adversary allocates resources in the cloud (e.g., IP addresses… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 17 publications
(27 reference statements)
0
2
0
Order By: Relevance
“…If a third-party attacker manipulates these Dare resources, they become insecure and exploitable. Three attack vectors to hijack these resources have been identified in existing works, involving expired domains [97], [134], [130], obsolete cloud IP addresses [16], [116], and third-party hosting services [97], [134].…”
Section: B Dangling Pdns Infrastructurementioning
confidence: 99%
See 1 more Smart Citation
“…If a third-party attacker manipulates these Dare resources, they become insecure and exploitable. Three attack vectors to hijack these resources have been identified in existing works, involving expired domains [97], [134], [130], obsolete cloud IP addresses [16], [116], and third-party hosting services [97], [134].…”
Section: B Dangling Pdns Infrastructurementioning
confidence: 99%
“…As a result, an attacker can launch denial of response by spoofing IP addresses of legitimate users and initiating queries for malicious domains, such that the PDNS servers will reject the users. Second, when rewriting DNS responses, 26 PDNS servers return addresses pointing to dangling cloud infrastructure [16], [116], which enables domain takeover for attackers and re-engages illegal activities. Finally, when queried for harmful domains, 105 PDNS servers return both forged and genuine responses, and clients may still connect to malicious hosts.…”
Section: Introductionmentioning
confidence: 99%