2019
DOI: 10.1080/01639625.2019.1616489
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the Capacity of DRDoS-For-Hire Services in Cybercrime Markets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
18
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 20 publications
1
18
0
Order By: Relevance
“…Such attacks can be carried out in one of several ways: a single attacker machine can launch a DoS attack against a victim machine by transmitting a large number of network traffic packets that appear to be legitimate, to bypass security controls along the way; multiple attacker machines can participate in a distributed-style DoS attack, i.e., a Distributed Denial of Service (DDoS) attack, resulting in a similar outcome at the victim machine. DoS attacks are increasingly becoming more sophisticated and harder to detect, because of the ready availability of attacker tools, as well as the proliferation of the CyberCrime as a Service (CCaaS) market [22]. 2) Man-in-The-Middle (MiTM) attacks: These are legacy cyberattacks carried out through the process of interception of transmitted data on a communication line between two legitimate communicating parties.…”
Section: Cybersecurity Threats and Legacy Cybersecurity Solutionsmentioning
confidence: 99%
“…Such attacks can be carried out in one of several ways: a single attacker machine can launch a DoS attack against a victim machine by transmitting a large number of network traffic packets that appear to be legitimate, to bypass security controls along the way; multiple attacker machines can participate in a distributed-style DoS attack, i.e., a Distributed Denial of Service (DDoS) attack, resulting in a similar outcome at the victim machine. DoS attacks are increasingly becoming more sophisticated and harder to detect, because of the ready availability of attacker tools, as well as the proliferation of the CyberCrime as a Service (CCaaS) market [22]. 2) Man-in-The-Middle (MiTM) attacks: These are legacy cyberattacks carried out through the process of interception of transmitted data on a communication line between two legitimate communicating parties.…”
Section: Cybersecurity Threats and Legacy Cybersecurity Solutionsmentioning
confidence: 99%
“…The services were primarily used by gamers to "boot" their opponents offline and win a game (Hutchings and Clayton 2016). But as the services began to be used for DDoS attacks against websites and other Internet resources, the operators began to refer to the services as "stressers" and advertised the stressers as a way to "stress" test their own IT systems (Hyslip and Holt 2019).…”
Section: Stressers and Bootersmentioning
confidence: 99%
“…In addition to reflecting the DRDoS attack, the attacks are also amplified when reflected off the vulnerable servers (Rossow and Gortz 2014). DRDoS attacks are able to execute large-scale DDoS attacks with very few resources while masking the source of the attack (Hyslip and Holt 2019). Recent attacks show stressers are able to launch DRDoS attacks in excess of 600 gigabits per second (Whitaker 2016).…”
Section: Stressers and Bootersmentioning
confidence: 99%
See 1 more Smart Citation
“…These services allow individuals to execute high-volume distributed denial of service attacks (DDoS) that render websites, gaming servers, and other online services unusable to others (Hutchings & Clayton, 2016;Hyslip & Holt, 2019;Santanna et al, 2015). Similar to how an unexpected traffic jam prevents regular traffic from arriving at its destination, a DDoS attack generally involves disrupting the normal traffic of a targeted server or network by overwhelming its flow of Internet traffic with more requests than can be fulfilled in millisecond intervals, rendering the platform inoperative to all parties until the traffic ceases (see Hutchings & Clayton, 2016;Hyslip & Holt, 2019).…”
Section: Introductionmentioning
confidence: 99%