2016 12th International Conference on Network and Service Management (CNSM) 2016
DOI: 10.1109/cnsm.2016.7818410
|View full text |Cite
|
Sign up to set email alerts
|

Booter blacklist: Unveiling DDoS-for-hire websites

Abstract: The expansion of Distributed Denial of Service (DDoS) for hire websites, known as Booters, has radically modified both the scope and stakes of DDoS attacks. Until recently, however, Booters have only received little attention from the research community. Given their impact, addressing the challenges associated with this phenomenon is crucial. In this paper, we present a rigorous methodology to identify a comprehensive set of existing Booters in the Internet. The methodology relies on well-defined mechanisms to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…DoS attacks generate large amounts of traffic which overwhelm end-users or web services, taking them offline or making legitimate access impossible [26]. Booter operators advertise customer-facing websites, where individuals can set up accounts and order attacks [54], with payments accepted using digital services such as PayPal or through transfers of cryptocurrency [22,28]. A range of different packages and membership options are available, with $10 to $20 being typical for a month's worth of DoS attacks of sufficient size to disrupt an end-user connection or a website which does not have specialist DoS protection.…”
Section: Introductionmentioning
confidence: 99%
“…DoS attacks generate large amounts of traffic which overwhelm end-users or web services, taking them offline or making legitimate access impossible [26]. Booter operators advertise customer-facing websites, where individuals can set up accounts and order attacks [54], with payments accepted using digital services such as PayPal or through transfers of cryptocurrency [22,28]. A range of different packages and membership options are available, with $10 to $20 being typical for a month's worth of DoS attacks of sufficient size to disrupt an end-user connection or a website which does not have specialist DoS protection.…”
Section: Introductionmentioning
confidence: 99%
“…Selected booter services. We select 4 popular booters (see Table 1) from the booter blacklist [46] based on their Alexa website rank (booter names anonymized). Two of the selected booters (A & B) were later seized by the FBI-led takedown.…”
Section: Self-attack Approachmentioning
confidence: 99%
“…First, we take a control plane perspective on the available booter domains. We use weekly snapshots of all .com/.net/.org domains to identify booter websites by keyword matching following [46] (e.g., "booter", "stresser", "ddos-as-a-service"). This gives us an overview of booter domains before and after the takedown.…”
Section: Domain Perspective On Takedownmentioning
confidence: 99%
See 1 more Smart Citation
“…Critical services can be subject to natural disasters, third-party failures such as power outages, configuration, and other failures. The rise of cyberattacks adds a directed dimension to these challenges, and the range of recent attacks (including Stuxnet [5], the Mirai botnet [6], and WannaCry [7]) has led to a burgeoning cybersecurity industry that supports a huge scientific and engineering effort to prevent attacks, develop mechanisms for ameliorating their effects, and provide forensic support for later investigation [8]. The critical nature of many networked systems and their increasingly intimate effects on the livelihoods (and indeed lives) of an increasing number of people is leading users to mandate specific levels of resilience for certain applications [9], [10].…”
Section: Introductionmentioning
confidence: 99%