2017 APWG Symposium on Electronic Crime Research (eCrime) 2017
DOI: 10.1109/ecrime.2017.7945057
|View full text |Cite
|
Sign up to set email alerts
|

1000 days of UDP amplification DDoS attacks

Abstract: Distributed Denial of Service (DDoS) attacks employing reflected UDP amplification are regularly used to disrupt networks and systems. The amplification allows one rented server to generate significant volumes of data, while the reflection hides the identity of the attacker. Consequently this is an attractive, low risk, strategy for criminals bent on vandalism and extortion. To measure the uptake of this strategy we analyse the results of running a network of honeypot UDP reflectors (median size 65 nodes) from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
54
0
6

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 53 publications
(62 citation statements)
references
References 17 publications
2
54
0
6
Order By: Relevance
“…The attack logs of three prominent booters 1 from 2014, 2016, and 2017/2018 all 1 Of the 285 414 attacks for booter.io recorded between 2014-03-24 and 2014-09-07, 261 968 (91%) are for method names indicating UDP reflection (UDP, CHARGEN, UDPLAG). Of the 169 845 attacks recorded between 2016-05-01 and 2016-07-23 for vDOS 123 751 (72%) are for method names indicating UDP reflection (DNS, NTP, SNMP, PORTMAP) [61]. Of the 412 059 attacks recorded for Webstresser ( §2.5) between 2017-10-18 and 2018-02-26, 339 181 (82%) were probably UDP reflection attacks based on their name.…”
Section: Datasetsmentioning
confidence: 99%
See 3 more Smart Citations
“…The attack logs of three prominent booters 1 from 2014, 2016, and 2017/2018 all 1 Of the 285 414 attacks for booter.io recorded between 2014-03-24 and 2014-09-07, 261 968 (91%) are for method names indicating UDP reflection (UDP, CHARGEN, UDPLAG). Of the 169 845 attacks recorded between 2016-05-01 and 2016-07-23 for vDOS 123 751 (72%) are for method names indicating UDP reflection (DNS, NTP, SNMP, PORTMAP) [61]. Of the 412 059 attacks recorded for Webstresser ( §2.5) between 2017-10-18 and 2018-02-26, 339 181 (82%) were probably UDP reflection attacks based on their name.…”
Section: Datasetsmentioning
confidence: 99%
“…The dataset is of victim IPs seen by a large number of honeypot machines roped into attacks using the protocols QOTD, CHARGEN, time, DNS, PORTMAP, NTP, LDAP, MSSQL Monitor, MDNS, and SSDP. Full details of the dataset are provided by Thomas et al along with a statistical analysis to show high levels of coverage for many of these UDP protocols [61]. For analysis we group flows of packets to the same victim IP or prefix for the same protocol until there is a gap of at least 15 minutes with no packets being received by any sensor.…”
Section: Datasetsmentioning
confidence: 99%
See 2 more Smart Citations
“…converting bitcoin to PayPal) can be used for money laundering [35]. Other illicit activities include trading online stolen accounts [18], hacking Massively Multiplayer Online (MMO) games for profit [13], or advertising booter services, technically offered as "Service Stress Tools", but which are actually used for DDoS attacks [41].…”
Section: Scraping Underground Forumsmentioning
confidence: 99%