cloud computing v.s. cyber security

36
11 Haziran 2015 Cloud Computing v.s. Cyber Security Bahtiyar BİRCAN TOBB-ETU [email protected]

Upload: bahtiyar-bircan

Post on 14-Aug-2015

116 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Cloud Computing v.s. Cyber Security

11 Haziran 2015

Cloud Computing v.s. Cyber Security

Bahtiyar BİRCAN

[email protected]

Page 2: Cloud Computing v.s. Cyber Security

Agenda

Cloud Computing Definition

Cloud Properties and Benefits

Cloud Computing fo Cyber Defense

Cloud Computing for Cyber Offense

Case Study: Cloud Based Cyber Attack

2

Page 3: Cloud Computing v.s. Cyber Security

Cloud Computing

Page 4: Cloud Computing v.s. Cyber Security

Cloud Computing Definiton

“Cloud computing is a model for enabling convenient, on-demand network

access to a shared pool of configurable computing resources (e.g. ,networks,

servers, storage,applications, and services) that can be rapidly provisioned and

released with minimal management effort or service provider interaction.”

NIST

Cloud computing refers to the on-demand provision of computational

resources (data, software) via a computer network, rather than from a local

computer.

Wikipedia

4

Page 5: Cloud Computing v.s. Cyber Security

• On-demand self-service

• Dynamic Resource Allocation

• Device / Location Independence

• Distributed architecture

• Scalable and Elastic

• High Computing Power

• High Bandwith

• High Storage Capacity

Cloud Characteristics

5

Page 6: Cloud Computing v.s. Cyber Security

Cloud Computing Benefits

6

Page 7: Cloud Computing v.s. Cyber Security

Cloud Models

7

Page 8: Cloud Computing v.s. Cyber Security

Cloud for Cyber Defense

Page 9: Cloud Computing v.s. Cyber Security

• DDoS Protection

• Web Application Attack Prevention

• Backup and Disaster Recovery

• Vulnerability Scan

• Penetration Testing & Security Audit

• Log Managamenet / SIEM

• Forensics as a Service

Cloud Usage for Cyber Defense

9

Page 10: Cloud Computing v.s. Cyber Security

DDoS Protection

Cloud Based DDoS Protection Services

• CloudFlare, Incapsula

10

Page 11: Cloud Computing v.s. Cyber Security

Web Application Attack Prevention

11

Page 12: Cloud Computing v.s. Cyber Security

Vulnerability Scanning

12

Page 13: Cloud Computing v.s. Cyber Security

Vulnerability Scanning

13

Page 14: Cloud Computing v.s. Cyber Security

Penetration Testing & Security Audit

14

Page 15: Cloud Computing v.s. Cyber Security

Forensics as a Service

15

Page 16: Cloud Computing v.s. Cyber Security

Cloud for Cyber Offense

Page 17: Cloud Computing v.s. Cyber Security

Cloud for Cyber Offense

Hacking as a Service

• Cloud properties for criminals

– Scalability,

– Quick Deployment

– Dynamic resource usage

– High computing power

– High bandwith

• Cyber criminals adapted their

tools and techniques for cloud

computing

• Unfortunately they are better at

using cloud platforms

17

Page 18: Cloud Computing v.s. Cyber Security

Cloud for Cyber Offense

Cloud Usage in Cyber Offense

• DDoS as a Service

• Botnet as a Service

• Malware as a Service

• Password Cracking

• BotClouds

• C&C Servers

• Warez as a Service

18

Page 19: Cloud Computing v.s. Cyber Security

DDoS as a Service

19

Source: McAfee

Page 20: Cloud Computing v.s. Cyber Security

Botnet as a Service

20Source: McAfee

Page 21: Cloud Computing v.s. Cyber Security

Malware as a Service

21

Source: Solutionary

Page 22: Cloud Computing v.s. Cyber Security

Password Cracking as a Service

Password Cracking Experiment

• Lentgth: 1-6 character

• Algorithm: SHA1

• Method: Brute Force

• Hardware:

– Amazon cg1.4xlarge

– 22 GB memory

– 2 x Intel Xeon X5570, quad-core

– 2 x NVIDIA Tesla M2050 GPUs

– 1690 GB of instance storage

• Crack time: 49 min

• Price: 2100 $

22

Page 23: Cloud Computing v.s. Cyber Security

Password Cracking as a Service

23

Page 24: Cloud Computing v.s. Cyber Security

Command & Control Servers

24

Page 25: Cloud Computing v.s. Cyber Security

Case Study: Cloud Based Cyber Attack

Page 26: Cloud Computing v.s. Cyber Security

• How easy it is to build cyberattack infrastructure at cloud?

• Can we build it at no cost ?

• Can we build it anonymously?

Case Study: Cloud Based Cyber Attack

26

Page 27: Cloud Computing v.s. Cyber Security

Get anonymous e-mail account

Register to cloud provider

Get free trial of cloud Linux image

Install attack software on VM

Register free DNS domain

Start attack

Large scale attack

Attack Scenario

27

Page 28: Cloud Computing v.s. Cyber Security

• Known e-mail providers: – Gmail,

– Yahoo,

– Yandex,

– Mail.ru

• One-time mail providers– Mailinator

Attack Step 1: Get Anonymous E-mail

28

Page 29: Cloud Computing v.s. Cyber Security

• Lots of cloud providersgive free trial accounts

– 1 week – 1 year trial

– Amazon

– Rackspace

– Siemens CloudServices

– …

Attack Step 2: Register to Cloud Provider

29

Page 30: Cloud Computing v.s. Cyber Security

Attack Step 3: Get a Trial of Linux VM Image

30

Page 31: Cloud Computing v.s. Cyber Security

Attack Step 4: Install Attack Software on VM

31

Page 32: Cloud Computing v.s. Cyber Security

Attack Step 5: Register Free DNS Domain

32

Page 33: Cloud Computing v.s. Cyber Security

Attack Step 6: Launch an Attack

Possible Attacks

• Denial of Service

• Port Scanning

• Vulnerability Scan

• Exploitation

• Pshishing Site

• Malware Server

• Password Cracking

33

Page 34: Cloud Computing v.s. Cyber Security

Attack Step 7: Large Scale Attacks

Creating 20 Cloud Bots

• Script for creating 20 cloud bot servers

34

Page 35: Cloud Computing v.s. Cyber Security

Attack Step 7: Large Scale Attacks

Creating 1000 Cloud Bots

• Script for creating 1000 cloud bot servers

35

Page 36: Cloud Computing v.s. Cyber Security

Thanks

Bahtiyar BİRCAN

[email protected]