Understanding Fileless Attacks on Linux-Based Iot Devices with Honeycloud

Total Page:16

File Type:pdf, Size:1020Kb

Understanding Fileless Attacks on Linux-Based Iot Devices with Honeycloud Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud Fan Dang1, Zhenhua Li1∗, Yunhao Liu1;2, Ennan Zhai3 Qi Alfred Chen4, Tianyin Xu5, Yan Chen6, Jingyu Yang7 1Tsinghua University 2Michigan State University 3Alibaba Group 4University of California, Irvine 5University of Illinois Urbana-Champaign 6Northwestern University 7Tencent Anti-Virus Lab ABSTRACT have employed Linux (e.g., OpenWrt and Raspbian) for its preva- With the wide adoption, Linux-based IoT devices have emerged as lence and programmability, and such a trend has been growing one primary target of today’s cyber attacks. Traditional malware- continuously [1]; meanwhile, the number of cyber attacks against based attacks can quickly spread across these devices, but they Linux-based IoT devices is also increasing rapidly [5]. In this paper, are well-understood threats with effective defense techniques such we, therefore, focus on Linux-based IoT devices and the attacks as malware fingerprinting and community-based fingerprint shar- targeting them. The Linux-based IoT attacks generally fall into two ing. Recently, fileless attacks—attacks that do not rely on malware categories: malware-based attacks and fileless attacks. files—have been increasing on Linux-based IoT devices, and posing Threats from malware-based attacks (e.g., Mirai, PNScan, and significant threats to the security and privacy of IoT systems. Little Mayday) have been widely known in IoT networks. For example, has been known in terms of their characteristics and attack vectors, global websites like GitHub and Twitter became inaccessible for which hinders research and development efforts to defend against hours in Oct. 2016, since their DNS provider, Dyn, was under DDoS them. In this paper, we present our endeavor in understanding file- attack by Mirai, which infected over 1.2 million IoT devices [11]. less attacks on Linux-based IoT devices in the wild. Over a span of These incidents raised high awareness of malware-based attacks twelve months, we deploy 4 hardware IoT honeypots and 108 spe- on IoT systems; throughout the past few years, their characteristics cially designed software IoT honeypots, and successfully attract a have been extensively studied and effective defense solutions have wide variety of real-world IoT attacks. We present our measurement been developed. For instance, the hash (e.g., MD5 or SHA-n) of a study on these attacks, with a focus on fileless attacks, including the malware’s binary file can be computed to fingerprint these IoT mal- prevalence, exploits, environments, and impacts. Our study further ware, and such fingerprints are then shared with the community 1 leads to multi-fold insights towards actionable defense strategies such as through VirusTotal . For a malware that has not been fin- that can be adopted by IoT vendors and end users. gerprinted, static and dynamic analysis can be applied to determine their malice [16]. CCS CONCEPTS Fileless attacks (also known as non-malware attacks or zero- footprint attacks) on IoT devices differ from malware-based at- • Security and privacy → Hardware attacks and countermea- tacks in that they do not need to download and execute malware sures; Mobile and wireless security. files to infect the victim IoT devices; instead, they take advantage ACM Reference Format: of existing vulnerabilities on the victim devices. In the past few Fan Dang, Zhenhua Li, Yunhao Liu, Ennan Zhai, Qi Alfred Chen, Tianyin years, increasingly more fileless attacks have been reported4 [ , 37], Xu, Yan Chen, and Jingyu Yang. 2019. Understanding Fileless Attacks on e.g., McAfee Labs reports that fileless attacks surged by 432% over Linux-based IoT Devices with HoneyCloud. In The 17th Annual International 2017 [3]. Traditional servers and PCs defend against fileless attacks Conference on Mobile Systems, Applications, and Services (MobiSys ’19), June 17–21, 2019, Seoul, Republic of Korea. ACM, New York, NY, USA, 12 pages. using sophisticated firewalls and antivirus tools [6]; however, these https://doi.org/10.1145/3307334.3326083 solutions are not suitable for the vast majority of IoT devices due to the limited computing and storage resources. As a result, fileless 1 INTRODUCTION attacks pose significant threats to the IoT ecosystem, given that IoT devices are often deployed in private and sensitive environments, Internet of Things (IoT) has quickly gained popularity across a wide such as private residences and healthcare centers. At the moment, range of areas like industrial sensing and control [36], home au- there is limited visibility into their characteristics and attack vec- etc. tomation [18], . In particular, the majority of today’s IoT devices tors, which hinders research and development efforts to innovate ∗ Corresponding author. new defense to combat fileless attacks. Permission to make digital or hard copies of all or part of this work for personal or 1.1 Study Methodology (§2) classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation To understand Linux-based IoT attacks in the wild, we use honey- on the first page. Copyrights for components of this work owned by others than the pots [31], which are known to be an effective method for captur- author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission ing unknown network attacks. We, therefore, first set up several and/or a fee. Request permissions from [email protected]. common Linux-based IoT devices in different places as hardware MobiSys ’19, June 17–21, 2019, Seoul, Republic of Korea honeypots. Each honeypot is coupled with a Remote Control Power © 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-6661-8/19/06...$15.00 https://doi.org/10.1145/3307334.3326083 1https://www.virustotal.com Adapter which can reset the honeypot when it is compromised. • Fileless attacks aggravate the threats to IoT devices by in- These offer us valuable insights into the specialties of IoT attacks. troducing stealthy reconnaissance methods and unique However, we notice that this first endeavor incurs unaffordable types of IoT attacks. On one side, we notice that 39.4% of the infrastructure and maintenance costs when deployed at scale. We, captured fileless attacks are collecting system information or therefore, attempt to explore a cheap and scalable approach to ef- performing de-immunization operations (e.g., shut down the fire- fectively capture and analyze real-world IoT attacks. wall and kill the watchdog) in order to allow more targeted and Intuitively, such an attempt can be empowered by public clouds efficient follow-up attacks. We suspect this is because fileless widely spread across the world. This seems to be a possible host for attacks are harder to fingerprint, and thus are highly suitable our quickly deploying numerous software (virtual) honeypots. Nev- for stealthy attack reconnaissance or preparations. On the other ertheless, this approach is subject to several practical issues. First, side, we find that fileless attacks can also be powerful attack the virtual honeypots should behave similarly to actual IoT devices, vectors on their own while maintaining high stealthiness. Specif- so as not to miss the relatively rare fileless attacks. Second, they ically, we capture a fileless attack in the wild that launched a should expose in-depth information of the interaction processes, targeted DDoS attack. The attack neither modifies the filesystem to facilitate our characterizing the usually hard-to-track fileless nor executes any shell commands, but can manipulate a swarm attacks. Finally, they have to conform with diverse policies imposed of IoT devices and make the attacker(s) invisible to victims. Since by different cloud providers, so that one cloud’s limitations would the only indication of such an attack is anomalous patterns of not essentially influence the coverage of our study results. To this outbound network traffic, it is highly challenging for existing end, we heavily customize the design of software honeypots by host-based defense mechanisms to detect it effectively. leveraging the insights collected from hardware honeypots, such as • IoT attacks in the wild are using various types of infor- kernel information masking, encrypted command disclosure, and mation to determine device authenticity. According to our data-flow symmetry monitoring. We carefully select eight public measurements on hardware honeypots, 9132 attacks executed clouds to disperse 108 abovementioned software honeypots, and the commands like lscpu to acquire sensitive system information. system is called HoneyCloud. These software honeypots employ In addition, with HoneyCloud we find an average of 6.7% fewer OpenWrt, which is one of the most popular Linux distributions for attacks captured by a honeypot hosted on AWS than one hosted IoT devices [1] and also suitable for customization. on other public clouds, probably because AWS has disclosed all Compared to a hardware honeypot as we show in §2.2, a soft- its VM instances’ IP ranges and some malware like Mirai does ware honeypot attracts 37% fewer suspicious connections and 39% not infect (in fact intentionally bypasses) specific IP ranges [11]. fewer attacks on average. On the other hand, the average monthly These insights are then leveraged to improve the design and maintenance fee of a software honeypot (∼6 US dollars) is 12.5× deployment of HoneyCloud in fidelity and effectiveness. less than that of a hardware honeypot (∼75 US dollars). More impor- • We discover new security challenges posed by fileless at- tantly, all the types of attacks captured by our hardware honeypots tacks and propose new defense directions. While leaving have also been captured by HoneyCloud (but not vice versa). This zero footprint on the filesystem, almost all the captured fileless shows the effectiveness of our design in practice. attacks are using shell commands and thus are detectable by au- 1.2 Findings and Implications (§3) diting the shell command history of IoT devices.
Recommended publications
  • A Modeling Language for Multi-Tenant Data Architecture Evolution in Cloud Applications
    School of Computing and Communications A Modeling Language for Multi-tenant Data Architecture Evolution in Cloud Applications Assylbek Sagitzhanuly Jumagaliyev M.Sc., International Information Technologies University, 2014 B.Sc., Suleyman Demirel University, 2011 Thesis submitted for the degree of Doctor of Philosophy 29 April 2019 Abstract Multi-tenancy enables efficient resource utilization by sharing application resources across multiple customers (i.e., tenants). Hence, applications built using this pat- tern can be o↵ered at a lower price and reduce maintenance e↵ort as less application instances and supporting cloud resources must be maintained. These properties en- courage cloud application providers to adopt multi-tenancy to their existing appli- cations, yet introducing this pattern requires significant changes in the application structure to address multi-tenancy requirements such as isolation of tenants, exten- sibility of the application, and scalability of the solution. In cloud applications, the data layer is often the prime candidate for multi-tenancy, and it usually comprises acombinationofdi↵erentcloudstoragesolutionssuchasblobstorage,relational and non-relational databases. These storage types are conceptually and tangibly di- vergent, each requiring its own partitioning schemes to meet multi-tenancy require- ments. Currently, multi-tenant data architectures are implemented using manual coding methods, at times following guidance and patterns o↵ered by cloud prov- iders. However, such manual implementation approach tends to be time consum- ing and error prone. Several modeling methods based on Model-Driven Engineer- ing (MDE) and Software Product Line Engineering (SPLE) have been proposed to capture multi-tenancy in cloud applications. These methods mainly generate cloud deployment configurations from an application model, though they do not automate implementation or evolution of applications.
    [Show full text]
  • First Half 2021 Letter to Co-Investors in Business Owner
    First Half 2021 Letter to Co-Investors in Business Owner Dear Co-Investors, The NAV of the Business Owner Fund was €994.14 as of 30 June 2021. The NAV increased 14.0% since the start of the year and 901.9% since inception on 30 September 2008. The compound annual growth rate since inception is 19.8%. Part 1: Humility It continually takes my breath away how differently things can turn out compared to what might reasonably be expected at the time. It is what makes investing endlessly fascinating but also incredibly hard. I was reminded of this recently by Credit Acceptance’s second quarter results. Collections for its 2019 cohort of consumer loans – the last one before the Covid-19 crisis – are not only tracking ahead of its initial expectations but are showing a large, positive variance. If I teleport myself back to March 2020 when the global economy was at an almost complete standstill, the only question on my mind was how bad unemployment could get. Did the Great Financial Crisis constitute a worst- case scenario? Or the Great Depression? Or neither? The idea that the 2019 cohort would not only do better than expected but by a large margin would have been laughable. With hindsight, it is easy to rationalize it, now that we know about stimulus cheques and the impact of the semiconductor shortage on used car prices. However, neither of these developments were known nor knowable at the time. It is a reminder, as if one were needed, of the importance of humility. Part 2: Increasing our Investment in China The most consequential capital allocation decision in the first half-year was to increase our investment China by purchasing a new position in Alibaba and increasing our holding in Prosus, the major shareholder of Tencent, China’s largest internet company.
    [Show full text]
  • Enigma2 Plugin Softcams Oscam Emu Sh4 1 179
    1 / 2 Enigma2 Plugin Softcams Oscam Emu Sh4 1 179 mezzo softcam key 1 Softcam For All HD Receiver – 14. mega-oscam/config/SoftCam. ... DreamBox , emu , enigma2 , OSCAM , Softcam , vu+ , vuplus NEW ... key Results 1 - 25 of 78 mezzo softcam key sh4-актуальный( SoftCam. ... file, software, yankse, dvb, mytheatre, progdvb, cwcamemu, plugin, .... Thx! C. com TSmedia Enigma2 Plugin by mfaraj57. ... the links of new Oscam Emu for Dreambox and Vu+ Enigma2 Images (OE 1. ... in filepush - [Player2 179/191] possible fix for chopped DTS You must be logged in at https://www. ... by using your Enigma2 receiver !. download softcam-feed-universal_2.. Enigma2 Plugin Softcams Oscam Emu Sh4 1 179 . Noticia Nueva version de Oscam Estás en el tema Noticia Nueva version de Oscam .... 1 OSCAM+SUPCAM NCAM+SUPCAM PLUGINS Linuxsat Active Code Plugins ... 4k Astra astra 19. html: enigma2 plugin extensions e2iplayer h git3701 + ef19340 r4 all (*. ... IPTV Player HasBahCa Обновился до крайней версии: 179. ... 1 to the new structure - new Softcam Manager - add emu on new style - add Cam .... Enigma2 Plugin Softcams Oscam Emu Sh4 1 179http://cinurl.com/123mb3. 0: 13-04-2015: 179 Jun 01, 2019 · the best file manager for E2 ever no ... 1 - sh4 is used for boxes like spark Openatv hbbtv plugin We've created the ... DM920 DM7080 DreamBox dreambox 900 emu enigma2 enigma 2 firmware ... For 4K ARMv7 receivers (Forum thread with latest version): enigma2-plugin-softcams-oscam .... Enigma2 Plugin Softcams Oscam Emu Sh4 1 Ipk The Daily. ... Cams: 1. CCcam 2. Mgcamd 1.38 3. Oscam Emu 11342-patched 4. .... 16 июл ...
    [Show full text]
  • Alberta Government Services ______Corporate Registry ______
    Alberta Government Services ____________________ Corporate Registry ____________________ Registrar’s Periodical REGISTRAR’S PERIODICAL, SEPTEMBER 15, 2006 ALBERTA GOVERNMENT SERVICES Corporate Registrations, Incorporations, and Continuations (Business Corporations Act, Cemetery Companies Act, Companies Act, Cooperatives Act, Credit Union Act, Loan and Trust Corporations Act, Religious Societies’ Land Act, Rural Utilities Act, Societies Act, Partnership Act) 0751152 B.C. LTD. Other Prov/Territory Corps 1256866 ALBERTA LTD. Numbered Alberta Registered 2006 AUG 11 Registered Address: 600, Corporation Incorporated 2006 AUG 14 Registered 12220 STONY PLAIN ROAD, EDMONTON Address: 314 CARMICHAEL WYND, EDMONTON ALBERTA, T5N 3Y4. No: 2112610379. ALBERTA, T6R 2K6. No: 2012568669. 101026957 SASKATCHEWAN LTD. Other 1256869 ALBERTA LTD. Numbered Alberta Prov/Territory Corps Registered 2006 AUG 15 Corporation Incorporated 2006 AUG 03 Registered Registered Address: SUITE 300, 255 - 17 AVE SW, Address: BOX #8, 125 8170 50 ST NW, EDMONTON CALGARY ALBERTA, T2S 2T8. No: 2112616210. ALBERTA, T6B 1E6. No: 2012568693. 101075855 SASKATCHEWAN LTD. Other 1257443 ALBERTA LTD. Numbered Alberta Prov/Territory Corps Registered 2006 AUG 15 Corporation Incorporated 2006 AUG 15 Registered Registered Address: 5105 - 49 STREET, Address: 1314 RIVERDALE AVENUE SW, LLOYDMINSTER ALBERTA, T9V 0K3. No: CALGARY ALBERTA, T2S 0Y8. No: 2012574436. 2112617788. 1258360 ALBERTA LTD. Numbered Alberta 101086914 SASKATCHEWAN LTD. Other Corporation Incorporated 2006 AUG 01 Registered Prov/Territory Corps Registered 2006 AUG 10 Address: 303-9811 34 AVE, EDMONTON ALBERTA, Registered Address: 176 STRATTEN WAY SE, T6E 5X9. No: 2012583601. MEDICINE HAT ALBERTA, T1B 3R3. No: 2112605619. 1258478 ALBERTA LTD. Numbered Alberta Corporation Incorporated 2006 AUG 01 Registered 10K CONSULTING LTD. Named Alberta Corporation Address: 282 TUSCANY VALLEY VIEW NW, Incorporated 2006 AUG 04 Registered Address: 2529-7 CALGARY ALBERTA, T3L 2K8.
    [Show full text]
  • Data Center Industry Overview Colby Synesael.Pdf
    INDUSTRY OVERVIEW MARCH 2019 Colby Synesael Senior Equity Research Analyst Cowen and Company 646 562 1355 [email protected] DATA CENTERS ARE PART OF COMMUNICATIONS INFRASTRUCTURE What Is Communications Infrastructure? • What Is Communications Infrastructure? – The idea that macro towers, data centers, optical fiber, and small cells/DAS represent one asset class whose singular purpose is the enablement of communications, and in so doing have developed business models very similar to one another, and in many cases more similar to the real estate industry than the telecom services industry. • Key attributes – Unit pricing increases over time (typically with an escalator) – Long-term contracts – High contribution margin • Think like a real estate company – Dark fiber, colocation, towers, land rights all qualify as REIT assets by the IRS – Return-oriented decision making – Value of AFFO as a metric • Scale matters – Supply chain mgmt. (i.e. cost to build) – Geographic diversity – Relatively low cost of capital Source: Cowen and Company “The Edge” Is The Next Frontier • Creating new opportunities • Fiber routes • Small cells • Data centers (more locations/smaller footprint per location) • Where the end-users of digital services reside • Compute/storage needs to occur closer to them • Tier II/III markets • Where wireless infrastructure meets wireline infrastructure Source: Cowen and Company SECTOR PERFORMANCE Strong Sector Performance Communications Infrastructure Index: 5-Year Performance (Indexed to 100 on 01/31/2014) 280 260 240 139% 220 200 180 160 140 120 100 80 Comm. Infra. Index Stocks: AMT, COR, CCI, CONE, DLR, EQIX, INXN, UNIT, QTS, SBAC, SWCH, ZAYO Data Center Index Stocks: COR, CONE, DLR, EQIX, INXN, QTS, SWCH Source: Thomson Reuters Strong Sector Performance Communications Infrastructure Index vs.
    [Show full text]
  • Dreambox ONE Ultrahd
    Dreambox ONE UltraHD Bedienungsanleitung Digitaler Satellitenempfänger zum Empfang von freien und 1x Smartcard-Leseschacht DreamcryptTM verschlüsselten DVB-Programmen. 1x USB 2.0 UltraHD 1x USB 3.0 Twin DVB-S2x Tuner ® HDMI 2.0 out Gigabit Netzwerk-Schnittstelle WIFI 2.4/5 GhZ Dreambox OS Bluetooth Dreambox API Vorwort Sehr geehrte Kundin, sehr geehrter Kunde, herzlichen Glückwunsch zum Kauf Ihrer Dreambox ONE UltraHD. Diese Bedienungsanleitung soll Ihnen dabei helfen Ihre Dreambox richtig anzuschließen, die grundlegende Bedienung zu erlernen und darüber hinaus die zahlreichen Funktionen kennenzulernen. Beachten Sie bitte, dass sich der Funktionsumfang Ihrer Dreambox durch Software-Updates stetig erweitert. Sollten Sie die Software Ihrer Dreambox aktualisiert haben oder Fehler in der Bedienungsanleitung feststellen, schauen Sie bitte in den Downloadbereich unserer Homepage www.leontechltd.com ob eine aktualisierte Bedienungsanleitung zur Verfügung steht. Wir wünschen Ihnen viel Freude mit Ihrer Dreambox ONE UltraHD. Die Dreambox trägt das CE-Zeichen und erfüllt alle erforderlichen EU-Normen. DiSEqCTM ist ein Warenzeichen von EUTELSAT. Dolby und das Doppel-D-Symbol sind eingetragene Warenzeichen von Dolby Laboratories. ® HDMI , das HDMI-Logo und „High Definition Multimedia Interface“ sind Marken oder eingetragene Marken von HDMI Licensing LLC. Änderungen und Druckfehler vorbehalten. i i Inhaltsverzeichnis 1 Vor Inbetriebnahme des Receivers 1 1.1 Sicherheitshinweise ...............................................................................................................
    [Show full text]
  • Launch Innovative Products Faster with Red Hat and Alibaba Cloud
    LAUNCH INNOVATIVE PRODUCTS FASTER WITH RED HAT AND ALIBABA CLOUD PARTNER BRIEF FAST INNOVATION AND AGILE DEPLOYMENT ARE CRITICAL FOR SUCCESS Worldwide, organizations face increasing competition as digital technologies continue to disrupt industries. To remain successful, they must differentiate themselves with compelling products while also controlling costs. However, if it takes too long to develop and launch new products, the business is likely to miss market opportunities and become less competitive. By 2020, In addition, many companies are adopting multicloud strategies to reduce risk. Yet choosing the 83% right set of cloud providers and services from the large number available — and then connecting of enterprise workloads will them into existing on-premise and cloud-based infrastructure — can be overwhelming. run on cloud infrastructure, Red Hat and Alibaba Cloud deliver the modern cloud foundation and innovative application develop- with 41% running on public ment technologies you need to quickly create high-value products, monitor and manage expenses, 1 cloud infrastructure. and mitigate technological risk. Red Hat and Alibaba Cloud BUILD A FLEXIBLE APPLICATION ENVIRONMENT provide a modern cloud foun- Red Hat and Alibaba Cloud combine production-grade open source software, global cloud infra- dation and innovative applica- structure, and advanced machine learning and big data capabilities into a high-performance, adapt- tion development technologies able platform for application development and deployment. A leading public cloud service provider, to help you build and launch Alibaba Cloud operates 18 datacenters globally. These datacenters are connected by fast networks compelling products quickly to provide a unified experience — no matter where you are or which datacenter you connect to.
    [Show full text]
  • Deploying Fortiweb-VM on Alibaba Cloud
    FORTINET DOCUMENT LIBRARY https://docs.fortinet.com FORTINET VIDEO GUIDE https://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTINET TRAINING & CERTIFICATION PROGRAM https://www.fortinet.com/support-and-training/training.html NSE INSTITUTE https://training.fortinet.com FORTIGUARD CENTER https://fortiguard.com/ END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: [email protected] Administration Guide TABLE OF CONTENTS Creating a virtual private cloud 4 Obtaining the deployment image 7 Uploading image file to Object Storage Service 9 Creating custom image 14 Creating FortiWeb-VM instance 16 Connecting to FortiWeb 19 Changing the default administrative ports 19 Changing the password 20 Administration Guide 3 Creating a virtual private cloud Creating a virtual private cloud 1. Assuming this is a new environment, the first step is to create the virtual private cloud (VPC). In the Alibaba Cloud web console, select Virtual Private Cloud. 2. Click Create VPC. 3. Configure the following settings. VPC Name Enter a name for the VPC. IPv4 CIDR Block Specify the IPv4 CIDR Block for this VPC. Resource Group Select the resource group for the VPC. VSwitch Name Enter a name for the VSwitch. Zone Select the zone of the VSwitch. In later steps, you should deploy FortiWeb-VM in the same zone. IPv4 CIDR Block Specify the IPv4 CIDR Block for this VSwitch. It should be a subnet of the VPC. Administration Guide 4 Creating a virtual private cloud Administration Guide 5 Creating a virtual private cloud Administration Guide 6 Obtaining the deployment image Obtaining the deployment image 1.
    [Show full text]
  • Cloud Computing
    JYOTI NIVAS COLLEGE PG CENTER DEPARTMENT OF MCA III YEAR TECH-ON-TAP E-JOURNAL ON CLOUD COMPUTING Issue 1, August 2020 Sl.no Title Page.no 1 Alibaba Cloud 1 2 Workday and Softchoice 2 3 Citrix Cloud Services and Nippon Data 4 4 Softlayer and Bluelock 6 5 IBM Cloud 7 6 Oracle Cloud 9 7 BackBlaze and Jira Cloud 10 8 SnowFlake 11 9 AWS Kiinesis and Verizon Cloud 12 10 Amazon Elastic Compute Cloud (EC2) 13 11 Google Cloud and Navtech Platform 14 12 Tresorit 16 13 Massive Grid and Egnyte 17 14 Microsoft Azure and Cloud-myNav 19 15 Box and OpenStack 20 16 Kamatera and SAP-S/4 Hana Cloud 22 17 Cloud Ways and Adobe Service 24 18 Cloud Sigma and Prolifics 25 19 MessageOPS - Cloud Service Provider 27 20 pCloud Service Provider 28 21 CtrlS and Zendesk 29 22 Century link and Service Now 31 23 Milesweb 33 24 Zoom Cloud 35 25 Collibra 36 26 GoDaddy and Amazon Web Services 37 27 Ubiquity Hosting and Mage Cloud 39 CLOUD SERVICE PROVIDERS Kushmetha k. A(18MCA08) Brunda S(18MCA05) Cloud Service Providers are the companies that offer network services, infrastructure or the business applications in the cloud. These cloud services are hosted in a data center using network connectivity that can be accessed by companies or individuals. Few different forms of services that can be used in the cloud by the CSPs include Software as a Service(SaaS), Platform as a Service(PaaS) and Infrastructure as a Service(IaaS). Alibaba Cloud: It is a chinese cloud computing company founded in 2009 by Jack Ma and Simon Hu.
    [Show full text]
  • AWS to Alibaba Cloud Web Hosting Migration Guide
    Alibaba Cloud Migration Guide AWS to Alibaba Cloud Web Hosting Migration Guide Issue: 20190424 Migration Guide AWS to Alibaba Cloud Web Hosting Migration Guide / Legal disclaimer Legal disclaimer Alibaba Cloud reminds you to carefully read and fully understand the terms and conditions of this legal disclaimer before you read or use this document. If you have read or used this document, it shall be deemed as your total acceptance of this legal disclaimer. 1. You shall download and obtain this document from the Alibaba Cloud website or other Alibaba Cloud-authorized channels, and use this document for your own legal business activities only. The content of this document is considered confidential information of Alibaba Cloud. You shall strictly abide by the confidentiality obligations. No part of this document shall be disclosed or provided to any third party for use without the prior written consent of Alibaba Cloud. 2. No part of this document shall be excerpted, translated, reproduced, transmitted, or disseminated by any organization, company, or individual in any form or by any means without the prior written consent of Alibaba Cloud. 3. The content of this document may be changed due to product version upgrades , adjustments, or other reasons. Alibaba Cloud reserves the right to modify the content of this document without notice and the updated versions of this document will be occasionally released through Alibaba Cloud-authorized channels. You shall pay attention to the version changes of this document as they occur and download and obtain the most up-to-date version of this document from Alibaba Cloud-authorized channels.
    [Show full text]
  • Universal Remote Code Book
    Universal Remote Code Book www.hestia-france.com TV CENTURION 0051 0169 CENTURY 0000 A CGE 0129 0047 0131 0043 ACER 1484 CIMLINE 0009 0028 ACME 0013 CITY 0009 ADA 0008 CLARIVOX 0169 0037 ADC 0012 0008 CLATRONIC 0009 0011 0051 0002 0083 ADMIRAL 0019 0108 0002 0001 0047 0003 0129 0030 0043 0000 COMBITECH 0248 ADYSON 0003 CONCORDE 0009 AGAZI 0002 CONDOR 0198 0051 0083 0003 0245 AGB 0123 CONRAC 0038 1395 AIKO 0003 0009 0004 CONTEC 0003 0009 0027 0030 0029 AIWA 0184 0248 0291 CONTINENTAL EDISON 0022 0111 0036 0045 0126 AKAI 1410 0011 0086 0009 0068 0139 0046 0004 0006 0008 0051 0061 COSMEL 0009 0088 0169 0200 0133 0141 CPRTEC 0156 0069 CROSLEY 0129 0131 0000 0043 AKIBA 0011 CROWN 0009 0169 0083 0047 0051 AKURA 0169 0074 0002 0009 0011 0245 0121 0043 0071 CS ELECTRONICS 0011 0129 0003 ALBA 0028 0027 0009 0011 0003 CTC 0129 0068 0083 0169 0047 0245 CTC CLATRONIC 0014 0248 0162 0062 CYBERCOM 0177 0038 0171 0002 0009 ALBIRAL 0037 0206 0205 0207 0208 0210 ALKOS 0164 0169 0042 0044 0127 0047 ALLORGAN 0157 0026 0061 0063 0067 0068 0103 ALLSTAR 0051 0107 0115 0154 0168 0185 ALTUS 0042 0228 0209 0343 0924 0933 AMPLIVISION 0003 0248 0291 AMSTRAD 0011 0009 0068 0074 0002 CYBERMAXX 0177 0038 0171 0002 0009 0108 0071 0069 0030 0123 0206 0200 0205 0207 0208 0013 0210 0211 0169 0015 0042 ANAM 0009 0065 0109 0044 0047 0048 0049 0061 ANGLO 0009 0063 0067 0068 0087 0103 ANITECH 0009 0002 0043 0109 0107 0115 0127 0154 0155 ANSONIC 0009 0014 0168 0170 0185 0228 0229 AOC 0134 0209 0218 1005 0894 0343 ARC EN CIEL 0126 0045 0139 0924 0933 0248 0291 ARCAM 0003 CYBERTRON
    [Show full text]
  • Specializovaný Velkoobchod Od: 25
    Maloobchodní ceník platný Specializovaný velkoobchod od: 25. Února 2013 s digitální satelitní a pozemní přijímací technikou IMPESAT spol. s r.o. tel: 376360911~13 - - 602359996 Zahradní 742/III fax: 376360914 25. února 2013 339 01 KLATOVY [email protected], [email protected] Digitální satelitní přijímače ID model zkrácený popis parametrů cena bez DPH cena s DPH CS box mini HD 114 CS box midi HD HD,USB PVR ready, HDMI, USB2.0, 1xCA, Fast Scann,Display,USB backup NOVINKA 1 890 Kč 2 287 Kč 114a CS box mini HD HD,USB PVR ready, HDMI, USB2.0, 1xCA, Fast Scann,Irdeto,USB backup prog. sezn. 1 750 Kč 2 118 Kč 182 CS box midi HD-Sky Výhodný set-přijímač+karta Skylink ICE-Výměna 2 220 Kč 2 686 Kč 182a CS box mini HD Skylink Výhodný set-přijímač+karta Skylink ICE-Výměna 2 090 Kč 2 529 Kč 184 CS box midi HD-M7 Výhodný set-přijímač+karta M7 Standard 2 290 Kč 2 771 Kč 184 CS box mini HD Skylink Výhodný set-přijímač+karta M7 Standard 2 090 Kč 2 529 Kč Humax SAT-HD 1 Humax IRHD 5100S Sat. HD,USB PVR , HDMI, 2xUSB2,1xCA Irdeto,1xCI,- záruka na přijímač 36měs. 2 630 Kč 3 182 Kč 247 Humax W-Lan Stick USB adaptér 150N WiFi klíč pro rec. Humax 5100 IRHD, rychlost dat až 150MBp 490 Kč 593 Kč 538 Humax IRHD 5100 Sky Výhodný set-přijímač+karta Skylink Výměna - záruka na přijímač 36měs . 3 050 Kč 3 691 Kč 647 Humax IRHD 5100 Sky Výhodný set- přijímač+karta M7 Standard - záruka na přijímač 36měs.
    [Show full text]