YoVDO

Dangling Resources Abuse on Cloud Platforms - Identifying and Analyzing Real-Life Hijacks

Offered By: USENIX via YouTube

Tags

Cloud Security Courses Cybersecurity Courses Digital Forensics Courses Search Engine Optimization Courses Threat Detection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore groundbreaking research on cloud resource hijacking in this 19-minute conference talk from NSDI '24. Discover the first-ever identification of real-life cloud resource hijacks, revealing surprising insights that challenge previous assumptions. Learn how attackers primarily target freetext records rather than IP addresses, and understand the difficulties in detecting these hijacks. Examine the novel approach developed to differentiate between malicious and legitimate modifications, uncovering over 20,000 instances of hijacked resources on popular cloud platforms. Investigate the persistence of these hijacks and the unexpected ways attackers abuse them, with a focus on blackhat search engine optimization. Gain valuable knowledge about the clustering of abuse resources and content, identifying approximately 1,800 individual attacking infrastructures.

Syllabus

NSDI '24 - Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms


Taught by

USENIX

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network