escalate its privileges to run network reconnaissance
scripts in the cloud network infrastructure, discover-
ing the cloud provider network topology and using
this information for promoting more precise attacks
against the network resources. 2) Cloud Exploit Kits
(Malware-as-a-Service): Malicious software hosted
inside cloud provider infrastructure and available to
other tenants to attack the provider services through
its network resources. 3) Network Programmability:
The attackers try to escalate their privileges to get ac-
cess to program APIs of the network devices (e.g.,
OpenFlow API).
4.5 Insecure APIs
Attacks to APIs can affect a broad range of cloud
modules, e.g., those responsible for resource alloca-
tion, authentication and identity management, stor-
age, or accounting. The network modules deployed
in VMs, as well as controller, computing and network
nodes, are usually distributed along the cloud infras-
tructure. Therefore, the APIs used for network vir-
tualization and configuration may be target of attacks
and vulnerability exploitation. For instance, attacks
based on code injection techniques may exploit com-
puter errors caused by processing invalid data, under-
mining cloud services and databases. This category
of attack may target either Providers or Tenants.
Threat Examples on Tenant-to-Tenant Scenario:
1) Code injection: The attacker performs SQL injec-
tion using a network controller API (e.g., Neutron) to
erase a tenant data from the cloud network configura-
tion database.
Threat Examples on Tenant-to-Provider Scenario:
1) Code injection: The attacker performs SQL injec-
tion using a network controller API (e.g., Neutron) to
modify (parts of) the network configuration database.
5 CONCLUSIONS AND FUTURE
WORK
The wide variety of threats related to cloud comput-
ing network virtualization makes it difficult to com-
pare or to categorize existing solutions focused on se-
curing virtual networks. This paper proposes a threat
classification for cloud virtual networks built upon
the “notorious nine cloud computing top threats” of
CSA. Moreover, the presented classification allows a
more detailed view of the network threats discussed
in cloud computing literature. This finer-grained ap-
proach makes it easier to identify the technologies
that might be used to solve different security issues
in cloud networking, facilitating the analysis and de-
sign of security solutions.
As future work we plan to employ this threat clas-
sification in a literature review of cloud networking
security solutions. The result expected is a compre-
hensive literature survey that allows not only com-
paring existing solutions, but also the identifying the
gaps and challenges in cloud networking security.
ACKNOWLEDGEMENTS
Innovation Center, Ericsson Telecomunicac¸
˜
oes S.A.
(Brazil) and CNPq (grant 305350/2013-7).
REFERENCES
Barjatiya, S. and Saripalli, P. (2012). BlueShield: A Layer 2
Appliance for Enhanced Isolation and Security Hard-
ening among Multi-tenant Cloud Workloads. IEEE
Int. Conf. on Utility and Cloud Comp., pages 195–198.
Basak, D., Toshniwal, R., Maskalik, S., and Sequeira, A.
(2010). Virtualizing networking and security in the
cloud. SIGOPS Oper. Syst. Rev., 44(4):86–94.
Catteddu, D. (2010). Cloud computing: Benefits, risks and
recommendations for information security. In Serr
˜
ao,
C., Aguilera D
´
ıaz, V., and Cerullo, F., editors, Web
Application Security, volume 72 of CCIS, page 17.
Chowdhury, N. and Boutaba, R. (2010). A survey of net-
work virtualization. Comput. Netw., 54(5):862–876.
Cohen, R., Barabash, K., Rochwerger, B., Schour, L.,
Crisan, D., Birke, R., Minkenberg, C., Gusat, M., Re-
cio, R., and Jain, V. (2013). An intent-based approach
for network virtualization. In IFIP/IEEE INM’13.
CSA (2011). Security Guidance for Critical Areas of Focus
in Cloud Computing V3.0. Technical report, CSA.
CSA (2013). The Notorious Nine Cloud Computing Top
Threats in 2013. Technical report, CSA.
ENISA (2013). Threat landscape 2013-overview of current
and emerging cyber-threats. Technical report, ENISA.
Gonzalez, N., Miers, C., Red
´
ıgolo, F., Jr. Simplicio, M.,
Carvalho, T., N
¨
aslund, M., and Pourzandi, M. (2012).
A quantitative analysis of current security concerns
and solutions for cloud computing. JCC, 1(1):1–18.
Hao, F., Lakshman, T. V., Mukherjee, S., and Song, H.
(2010). Secure Cloud Computing with a Virtualized
Network Infrastructure. In Proc. of the USENIX.
Mattos, L. F. D. and Duarte, O. C. M. B. (2013). A Mech-
anism for Secure Virtual Network Isolation Using to
Hybrid Approach Xen and OpenFlow. In SBSeg’2013.
Mell, P. and Grance, T. (2011). The NIST definition of
cloud computing (draft). Technical report, NIST.
Myagmar, S., Lee, A., and Yurcik, W. (2005). Threat mod-
eling as a basis for security requirements. In SREIS.
Natarajan, S. and Wolf, T. (2012). Security issues in net-
work virtualization for the future internet. In ICNC.
ClassifyingSecurityThreatsinCloudNetworking
219