DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zand, Ali | ko |
dc.contributor.author | Modelo-Howard, Gaspar | ko |
dc.contributor.author | Tongaonkar, Alok | ko |
dc.contributor.author | Lee, Sung-Ju | ko |
dc.contributor.author | Kruegel, Christopher | ko |
dc.contributor.author | Vigna, Giovanni | ko |
dc.date.accessioned | 2017-08-08T06:47:18Z | - |
dc.date.available | 2017-08-08T06:47:18Z | - |
dc.date.created | 2017-08-07 | - |
dc.date.created | 2017-08-07 | - |
dc.date.created | 2017-08-07 | - |
dc.date.issued | 2017-07 | - |
dc.identifier.citation | IEEE COMMUNICATIONS MAGAZINE, v.55, no.7, pp.14 - 21 | - |
dc.identifier.issn | 0163-6804 | - |
dc.identifier.uri | http://hdl.handle.net/10203/225217 | - |
dc.description.abstract | In recent years, we have observed a resurgence of DDoS attacks. These attacks often exploit vulnerable servers (e.g., DNS and NTP) to produce large amounts of traffic with little effort. However, we have also observed the appearance of application-level DDoS attacks, which leverage corner cases in the logic of an application in order to severely reduce the availability of the provided service. In both cases, these attacks are used to extort a ransom, to hurt a target organization, or to gain some tactical advantage. As it has happened for many of the components in the underground economy, DDoS has been commoditized, and DDoS as a service (DaaS) providers allow paying customers to buy and direct attacks against specific targets. In this article, we present a measurement study of 17 different DaaS providers, in which we analyzed the different techniques used to launch DDoS attacks, as well as the infrastructure leveraged in order to carry out the attacks. Results show a growing market of short-lived providers, where DDoS attacks are available at low cost (tens of dollars) and capable of easily disrupting connections of over 1.4 Gb/s. In our study, particular attention was given to characterize application-level (HTTP) DDoS attacks, which are more difficult to study given the low volume of traffic they generate and the need to study the logic of the application providing the target service. | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Demystifying DDoS as a Service | - |
dc.type | Article | - |
dc.identifier.wosid | 000405724800003 | - |
dc.identifier.scopusid | 2-s2.0-85028416300 | - |
dc.type.rims | ART | - |
dc.citation.volume | 55 | - |
dc.citation.issue | 7 | - |
dc.citation.beginningpage | 14 | - |
dc.citation.endingpage | 21 | - |
dc.citation.publicationname | IEEE COMMUNICATIONS MAGAZINE | - |
dc.identifier.doi | 10.1109/MCOM.2017.1600980 | - |
dc.contributor.localauthor | Lee, Sung-Ju | - |
dc.contributor.nonIdAuthor | Zand, Ali | - |
dc.contributor.nonIdAuthor | Modelo-Howard, Gaspar | - |
dc.contributor.nonIdAuthor | Tongaonkar, Alok | - |
dc.contributor.nonIdAuthor | Kruegel, Christopher | - |
dc.contributor.nonIdAuthor | Vigna, Giovanni | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.