Clouds for Hit-and-Run Wireless Attacks

J. Jenny Li, Fenando Neto, Jingchio Liou

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Most cloud security research focuses on its protection from security threats. In this paper, we studied how to use cloud infrastructure to carry out Hit-and-Run type of attacks to a wireless networks. We demonstrate how to use cloud to gain access and control to routers while hiding attacker identities. We illustrate such an attack on a private wireless network using a cloud virtual environment. Besides identifying the vulnerabilities of wireless routers, we studied the damages can be done through such attacks and propose some solutions to detect and protect against this kind of hit-and-run attacks.

Original languageEnglish
Title of host publicationProceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
EditorsMeikang Qiu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages67-72
Number of pages6
ISBN (Electronic)9781509024025
DOIs
StatePublished - 30 Jun 2016
Event2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016 - New York, United States
Duration: 9 Apr 201610 Apr 2016

Publication series

NameProceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016

Conference

Conference2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
Country/TerritoryUnited States
CityNew York
Period9/04/1610/04/16

Keywords

  • cloud
  • virtual machine
  • wireless security

Fingerprint

Dive into the research topics of 'Clouds for Hit-and-Run Wireless Attacks'. Together they form a unique fingerprint.

Cite this