6 CONCLUSIONS
This paper discusses the ability to launch attacks from
within the Cloud against external targets. Two ex-
periments demonstrate the simplicity and low cost of
launching such attacks. Porting traditional botnet de-
tection techniques to the Cloud is not straightforward,
thus new techniques are required. One possible tech-
nique is extrusion detection. This would require CSPs
to monitor outbound traffic to detect and respond to
suspicious activity. Current policy is to wait until
the victims of attacks contact the responsible CSP at
which point action is taken to disable the attack. Until
CPSs implement a comprehensive botcloud detection
and removal policy, botmasters will continue to move
their malicious activities into the Cloud and botclouds
will continue to grow.
Possible areas of future work include research into
Cloud deployment of extrusion detection systems and
designing incentives for CSPs to proactively monitor
for botclouds.
ACKNOWLEDGEMENTS
This work is a result of support provided by the NLnet
Foundation (http://www.nlnet.nl).
REFERENCES
Anselmi, D., Boscovich, R., et al. (2010). Security intelli-
gence report. Technical Report Volume 9, Microsoft.
Anthes, G. (2010). Security in the cloud. Communications
of the ACM, 53(11):16–18.
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R.,
Konwinski, A., Lee, G., Patterson, D., Rabkin, A.,
Stoica, I., et al. (2010). A view of cloud computing.
Communications of the ACM, 53(4):50–58.
Chandrashekar, J. (2009). The Dark Cloud: Understanding
and Defending Against Botnets and Stealthy Malware.
Intel
R
Technology Journal, 13(2).
Chen, Y., Paxson, V., and Katz, R. (2010). What’s New
About Cloud Computing Security. Technical Report
Report No. UCB/EECS-2010-5, University of Cali-
fornia, Berkeley.
Clayton, R. (2004). Stopping spam by extrusion detection.
In First Conference on Email and Anti-Spam.
Dagon, D., Gu, G., Lee, C., and Lee, W. (2007). A taxon-
omy of botnet structures. In acsac, pages 325–339.
IEEE Computer Society.
Haddadi, H. (2010). Fighting online click-fraud using bluff
ads. ACM SIGCOMM Computer Communication Re-
view, 40(2):21–25.
Ianelli, N. and Hackworth, A. (2005). Botnets as a vehicle
for online crime. CERT Coordination Center, pages
1–28.
Jing, L., Yang, X., Kaveh, G., Hongmei, D., and Jingyuan,
Z. (2009). Botnet: Classification, attacks, detection,
tracing, and preventive measures. EURASIP journal
on wireless communications and networking.
Kshetri, N. (2010). The economics of click fraud. IEEE
Security and Privacy, pages 45–53.
Maggi, F. and Zanero, S. (2010). Rethinking security in a
cloudy world. Technical report, Dipartimento di Elet-
tronica e Informazione, Politecnico di Milano.
Mirkovic, J. and Reiher, P. (2004). A taxonomy of DDoS
attack and DDoS defense mechanisms. ACM SIG-
COMM Computer Communication Review, 34(2):39–
53.
Noh, S., Oh, J., Lee, J., Noh, B., and Jeong, H. (2009). De-
tecting P2P botnets using a multi-phased flow model.
In Third IEEE International Conference on Digital
Society, pages 247–253.
Ruiter, J. and Warnier, M. (2011). Privacy regulations
for cloud computing, compliance and implementation
in theory and practice. In Gutwirth, S., Poullet, Y.,
de Hert, P., and Leenes, R., editors, Computers, Pri-
vacy and Data Protection: an Element of Choice,
chapter 17, pages 293–314. Springer.
Schoof, R. and Koning, R. (2007). Detecting peer-
to-peer botnets. University of Amsterdam,
http://www.science.uva.nl/ delaat/sne-2006-
2007/p17/report.pdf.
Wilbur, K. and Zhu, Y. (2009). Click fraud. Marketing
Science, 28(2):293–308.
Zeidanloo, H., Shooshtari, M., Amoli, P., Safari, M., and
Zamani, M. (2010). A taxonomy of Botnet detec-
tion techniques. In Computer Science and Information
Technology (ICCSIT), 2010 3rd IEEE International
Conference on, volume 2, pages 158–162. IEEE.
Zhang, L. and Guan, Y. (2008). Detecting click fraud in
pay-per-click streams of online advertising networks.
In The 28th International Conference on Distributed
Computing Systems, pages 77–84. IEEE.
BOTCLOUDS - The Future of Cloud-based Botnets?
603