Hacking in the cloud
ORCID Identifiers
Document Type
Article
Source of Publication
Internet Technology Letters
Publication Date
11-26-2018
Abstract
Cloud computing is a widely expanding and rapidly adopted field of technology. The ability to grant significantly more computational resources than a single machine allows, through use of virtual machines, is incredibly helpful to enterprises that need to meet the demands of hundreds of thousands of concurrent users. However, just as these resources can be used for meaningful purposes, they can also be used for malicious attacks. In this paper, we present the legal and ethical challenges of hacking in the cloud citing specific cyber laws from Canada and the United Arab Emirates, along with the terms of use of cloud service providers. We also present the results of a legal SYN (synchronization) flood attack experiment, utilizing packets with spoofed source internet protocol addresses to determine if this attack works on a cloud service provider. We offer recommendations based on whether or not the cloud platform provides sufficient utility to be used in aiding hackers with their tasks, or if the legal and ethical issues surrounding the implementations ruin any opportunities before development even begins.
DOI Link
ISSN
Publisher
Wiley
Volume
2
First Page
e84
Disciplines
Computer Sciences
Recommended Citation
Gregorio, Nick; Mathanamohan, Janahan; Mahmoud, Qusay H.; and AlTaei, May, "Hacking in the cloud" (2018). All Works. 1826.
https://zuscholars.zu.ac.ae/works/1826
Indexed in Scopus
no
Open Access
yes
Open Access Type
Bronze: This publication is openly available on the publisher’s website but without an open license