Lack of abuse detection allows cloud computing instances to be used like botnets, study says