TY - JOUR
T1 - A comprehensive measurement of cloud service abuse
AU - Fukushi, Naoki
AU - Chiba, Daiki
AU - Akiyama, Mitsuaki
AU - Uchida, Masato
N1 - Funding Information:
Acknowledgments This work was supported in part by the Japan Society for the Promotion of Science through Grants-in-Aid for Scientific Research (C) (20K11800).
Publisher Copyright:
© 2021 Information Processing Society of Japan.
PY - 2021
Y1 - 2021
N2 - Cloud services are maliciously used as an infrastructure for cyber-attacks. In a cloud service, the assigned Internet Protocol (IP) address for a server is owned by the cloud service provider. When the server is shut down, the assigned IP address is freed for reuse and assigned to another server in the same cloud service. Cyber-attackers abusing cloud services in this way therefore pose a serious risk since legitimate service providers, developers, and end users may be mistakenly blacklisted which lowers the image and hurts the reputation of the service. In this study, we conducted a large-scale measurement of cloud service abuse by using blacklisted IP addresses. Our analysis of four cloud services over 154 days using 39 blacklists revealed that a total of 61,060 IP addresses from these cloud service providers were blacklisted, approximately 14,000 IP addresses continue to be blacklisted, and approximately 5% are replaced daily. Moreover, our study revealed trends in attacks that abuse cloud services with respect to attack type, region, duration, and anti-abuse countermeasures. Finally, we discuss recommendations for cloud service users, cloud service providers, and blacklist providers.
AB - Cloud services are maliciously used as an infrastructure for cyber-attacks. In a cloud service, the assigned Internet Protocol (IP) address for a server is owned by the cloud service provider. When the server is shut down, the assigned IP address is freed for reuse and assigned to another server in the same cloud service. Cyber-attackers abusing cloud services in this way therefore pose a serious risk since legitimate service providers, developers, and end users may be mistakenly blacklisted which lowers the image and hurts the reputation of the service. In this study, we conducted a large-scale measurement of cloud service abuse by using blacklisted IP addresses. Our analysis of four cloud services over 154 days using 39 blacklists revealed that a total of 61,060 IP addresses from these cloud service providers were blacklisted, approximately 14,000 IP addresses continue to be blacklisted, and approximately 5% are replaced daily. Moreover, our study revealed trends in attacks that abuse cloud services with respect to attack type, region, duration, and anti-abuse countermeasures. Finally, we discuss recommendations for cloud service users, cloud service providers, and blacklist providers.
KW - Blacklist
KW - Cloud
KW - IP address
UR - http://www.scopus.com/inward/record.url?scp=85099834685&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85099834685&partnerID=8YFLogxK
U2 - 10.2197/ipsjjip.29.93
DO - 10.2197/ipsjjip.29.93
M3 - Article
AN - SCOPUS:85099834685
SN - 0387-5806
VL - 29
SP - 93
EP - 102
JO - Journal of Information Processing
JF - Journal of Information Processing
ER -