Computer and Network Security Final Project Report
Computer and Network Security Final Project Report
SAWANI SOMAN
Side channel attack requires two main steps: Placement and Extraction. Placement refers to the
adversary or attacker arranging to place their malicious VM on the same physical machine.
Extraction: After successfully placement of the malicious VM to the targeted VM extract the
confidential information, file and documents on the targeted VM.
Page 1 of 8
FINAL PROJECT REPORT NAME: RUSHIKESH JAGDALE
SAWANI SOMAN
(2) Brute Force Attack: - A brute force attack is a technique used to break passwords. The success
of this attack is greatly reliant on powerful computing capability because thousands of possible
passwords are needed to be sent to a target user’s account until it finds the correct one to access.
Cloud computing system provides a perfect platform for hackers to launch this type of attack.
(3) Privilege Escalation Attack: - A privilege escalation attack is a type of network intrusion that
grant the attacker elevated access to the network and its associated data and applications. There
are two kinds of privilege escalation attacks: - Vertical and Horizontal.
Vertical privilege escalation: - It requires the attacker to grant himself higher privileges. This is
typically achieved by performing kernel-level operations that allow the attacker to run
unauthorized code.
Horizontal privilege escalation: - It requires the attacker to use the same level of privileges he
already has been granted, but assume the identity of another user with similar privileges. For
example, someone gaining access to another person's online banking account would constitute
horizontal privilege escalation.
(4) Replay Attack: - A replay attack occurs when an attacker copies a stream of messages between
two parties and replays the stream to one or more of the parties.
(5) Active Directory Password Breach: -In openstack the password is stored in openrc file and also
required while login. When using the command line clients, the users had the choice of storing
their password in environment variables such as with the local openrc script or re-typing their
password with each OpenStack command. Passwords in environment variables has significant
security risks since they are passed to any sub-command and can be read by the system
administrator of the server you are on. [2]
Page 2 of 8
FINAL PROJECT REPORT NAME: RUSHIKESH JAGDALE
SAWANI SOMAN
Page 3 of 8
FINAL PROJECT REPORT NAME: RUSHIKESH JAGDALE
SAWANI SOMAN
Page 4 of 8
FINAL PROJECT REPORT NAME: RUSHIKESH JAGDALE
SAWANI SOMAN
resources; and an auditor role might access only audit trails. Roles are used for system
administration.
Thus in the above shown Cloud IaaS architecture different tables are stored in the cloud service
provider database also known as security profile catalog are used to check the user roles and the
permissions or operations user has. Also CSP has the user profile catalog that defines the roles of
the user.
Page 5 of 8
FINAL PROJECT REPORT NAME: RUSHIKESH JAGDALE
SAWANI SOMAN
Pseudo Code for implementing proposed Cloud IaaS with Kerberos Authentication Protocol
1. Alice Enters password in her workstation.
2. When her password is matched with hash value of her password, she can access her work
station
3. Alice request CSP for TGT in order to establish communication between other resources
available on CSP
4. Security server of CSP will ask KDC to generate session key S A and provide TGT to
Alice
5. Alice will extract the message received from KDC using her key KA and delete KA
6. Upon establishing connection between KDC and Alice, she can ask for resources of CSP
7. Alice will request KDC to access some resources like print server to KDC
8. Security server will check the user profile and security profile database before giving any
access to Alice.
9. If Alice requested for resources according to her capabilities, KDC will send appropriate
ticket to Alice or else will not allow her to access the resources.
10. If the database matches with the requirements of Alice, KDC will send ticket to
respective resource server along with the session key between Alice and Resource Server
11. Resource server can challenge Alice using session key in order to have mutual
authentication.
Page 6 of 8
FINAL PROJECT REPORT NAME: RUSHIKESH JAGDALE
SAWANI SOMAN
1. Ransomware attack: - In this attack, all the files of the victim server are encrypted using
public key system. This kind of attack takes place due to malware injection in the system
2. DOS (Denial of Service Attack): This attack happens due to flooding of request to the
system and flooding of resources. When the Cloud Computing operating system notices
the high workload on the flooded service, it will start to provide more computational power
(more virtual machines, more service instances) to cope with the additional workload.
Thus, the server hardware boundaries for maximum workload to process do no longer hold.
In that sense, the Cloud system is trying to work against the attacker (by providing more
computational power), but actually to some extent even supports the attacker by enabling
him to do most possible damage on a service’s availability, starting from a single flooding
attack entry point. Thus, the attacker does not have to flood all n servers that provide a
certain service in target, but merely can flood a single, Cloud-based address in order to
perform a full loss of availability on the intended service. [3]
Page 7 of 8
FINAL PROJECT REPORT NAME: RUSHIKESH JAGDALE
SAWANI SOMAN
attacker would be required to trick that hash value comparison in order to inject his
malicious instances into the Cloud system. [3]
References:
[1] Bhrugu Sevak (December 2012). Security against Side Channel Attack in Cloud Computing”,
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958,
Volume-2, Issue-2,
[2] http://openstack-in-production.blogspot.com/2014/10/kerberos-and-single-sign-on-with.html
[3] Singh, A., & Shrivastava, M. (2012). Overview of security issues in cloud
computing.International Journal of Advanced Computer Research, 2(1), 41-41.
[4] https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks
[5] https://elastic-security.com/2013/09/11/how-to-detect-side-channel-attacks-in-cloud-
infrastructures/
[6] Chou, T. (2013). security threats on cloud computing vulnerabilities. International Journal of Computer
Science & Information Technology, 5(3), 79-79.
Page 8 of 8