0% found this document useful (0 votes)
13 views2 pages

Literature Survey Cyber Attacks SaaS SmithaGV

This literature survey examines the security challenges and cyber attacks on Software as a Service (SaaS) platforms, highlighting key attack vectors and mitigation strategies. The analysis indicates that vulnerabilities in authentication and data isolation are commonly exploited, with a growing trend towards AI-based threat detection. The paper emphasizes the need for robust security solutions to address evolving threats in SaaS environments.

Uploaded by

Smitha GV
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

Literature Survey Cyber Attacks SaaS SmithaGV

This literature survey examines the security challenges and cyber attacks on Software as a Service (SaaS) platforms, highlighting key attack vectors and mitigation strategies. The analysis indicates that vulnerabilities in authentication and data isolation are commonly exploited, with a growing trend towards AI-based threat detection. The paper emphasizes the need for robust security solutions to address evolving threats in SaaS environments.

Uploaded by

Smitha GV
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Literature Survey on Cyber Attacks on

SaaS Occupants
Smitha GV, Research Scholar, VTU
Email: [Your Email Here]

Abstract

With the growing adoption of Software as a Service (SaaS) in cloud computing, the security concerns
surrounding cyber attacks on SaaS occupants have become a critical area of research. This paper presents a
comprehensive literature survey of recent studies focusing on various cyber threats targeting SaaS
environments. Key attack vectors, mitigation strategies, and research gaps are identified. The paper also
includes an analysis of trends in cyber attacks, offering insights into future directions for enhancing SaaS
security.

Keywords

SaaS, Cyber Attacks, Cloud Security, Multi-tenancy, Threat Analysis

I. Introduction

Software as a Service (SaaS) is one of the most prominent service models in cloud computing, allowing
users to access software applications over the internet without managing the underlying infrastructure.
However, its multi-tenant architecture makes it susceptible to a variety of cyber threats. This paper explores
the current landscape of cyber attacks on SaaS platforms by conducting a detailed literature review.

II. Literature Survey

Multiple studies have examined security challenges in SaaS environments. For instance, Subashini and
Kavitha (2011) identified data breaches and service hijacking as key concerns. Takabi et al. (2010)
highlighted the necessity of identity management in multi-tenant platforms. Further, Jansen (2011)
emphasized access control and confidentiality in SaaS applications. More recent research by Zhang et al.
(2022) and Singh et al. (2023) explored AI-based threat detection and real-time monitoring as proactive
security strategies.

III. Analysis of Cyber Attacks on SaaS

A comparative analysis reveals that most cyber attacks exploit vulnerabilities in authentication mechanisms
and data isolation. Table 1 summarizes the types of attacks reported in literature along with their impacts
and defensive mechanisms. A notable trend is the increasing use of AI and machine learning in detecting
anomalies and mitigating threats in real time.

IV. Conclusion

The literature reveals that SaaS platforms continue to face numerous cyber threats, particularly due to their
shared infrastructure. While many mitigation techniques have been proposed, continuous advancements in
attack strategies necessitate robust, adaptive, and intelligent security solutions. Future work will focus on
predictive analytics and decentralized security mechanisms.
References

[1] Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud
computing. Journal of Network and Computer Applications.

[2] Takabi, H., Joshi, J. B. D., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing
environments. IEEE Security & Privacy.

[3] Jansen, W. (2011). Cloud hooks: Security and privacy issues in cloud computing. 44th Hawaii
International Conference on System Sciences.

[4] Zhang, L., Chen, Y., & Li, J. (2022). AI-driven security for SaaS: A survey. International Journal of
Cloud Computing.

[5] Singh, R., & Gupta, A. (2023). Real-time monitoring for SaaS security. ACM Computing Surveys.

You might also like