Skip to main content

On the Feasibility of Automated Semantic Attacks in the Cloud

  • Conference paper
  • First Online:
Computer and Information Sciences III

Abstract

While existing security mechanisms often work well against most known attack types, they are typically incapable of addressing semantic attacks. Such attacks bypass technical protection systems by exploiting the emotional response of the users in unusual technical configurations rather than by focussing on specific technical vulnerabilities. We show that semantic attacks can easily be performed in a cloud environment, where applications that would traditionally be run locally may now require interaction with an online system shared by several users. We illustrate the feasibility of an automated semantic attack in a popular cloud storage environment, evaluate its impact and provide recommendations for defending against such attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schneier, B.: Inside risks: semantic network attacks. Commun. ACM 43(12), 168 (2000)

    Article  Google Scholar 

  2. Tiantian Qi.: An investigation of heuristics of human judgement in detecting deception and potential implications in countering social engineering. In: IEEE International Conference on Intelligence and Security Informatics, pp. 152–159, New Brunswick, USA, May 2007

    Google Scholar 

  3. Chen, Y., Katz, R.H.: Glimpses of the Brave New World for Cloud Security. Feature Article. HPC in the Cloud, 22 Feb 2011

    Google Scholar 

  4. Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M.: Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In: Proceedings of the 20th USENIX Conference on Security, CA, USA, 10–12 Aug 2011

    Google Scholar 

  5. Levine, T.R., Kim, R.K., Park, H.S., Hughes, M.: Deception detection accuracy is a predictable linear function of message veracity base-rate: a formal test of Park and Levine probability model. Commun. Monogr. 73, 243–260 (2006)

    Article  Google Scholar 

  6. Hinson, G.: Social engineering techniques, risks and controls. The EDP Audit, Control, and Security. Newsletter 37, 32–45 (2008)

    Google Scholar 

  7. Latze, C., Ultes-Nitsche, U.: How to Protect even Naive User against Phishing, Pharming and MITM Attacks. Communication Systems, Networks, and Applications, pp. 111–116, Beijing, China, Oct 2007

    Google Scholar 

  8. Yahoo Inc. What is a sign-in seal? Retrieved from Yahoo Security Center. http://security.yahoo.com/article.html?aid=2006102507 (2012)

  9. Trusteer. Rapport Overview. Retrieved from Trusteer Building Trust Online. http://www.trusteer.com/product/trusteer-rapport (2011)

  10. Bacon, J., Evans, D., Eyers, D.M., Migliavacca, M., Pietzuch, P., Shand, B.: Enforcing end-to-end application security in the cloud. In: 11th International Middleware Conference, Bangalore, India, Nov 2010

    Google Scholar 

  11. Hasan, M.I., Prajapati, N.B.: An attack vector for deception through persuasion used by Hackers and Crackers. Networks and Communications, pp. 254–258, ISBN 978-1-4244-5364-1, 27-29 Dec 2009

    Google Scholar 

  12. Mitnick, K., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley, Indianapolis (2002), ISBN 978-0471237129

    Google Scholar 

  13. Jordan, M., Goudey, H.: The signs, and semiotics of the successful semantic attack. In: 14th Annual EICAR Conference, Malta, pp. 344–364. 2005

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to George Loukas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this paper

Cite this paper

Heartfield, R., Loukas, G. (2013). On the Feasibility of Automated Semantic Attacks in the Cloud. In: Gelenbe, E., Lent, R. (eds) Computer and Information Sciences III. Springer, London. https://doi.org/10.1007/978-1-4471-4594-3_35

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4594-3_35

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4593-6

  • Online ISBN: 978-1-4471-4594-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics