2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) 2015
DOI: 10.1109/inm.2015.7140298
|View full text |Cite
|
Sign up to set email alerts
|

Booters — An analysis of DDoS-as-a-service attacks

Abstract: In 2012, the Dutch National Research and Education Network, SURFnet, observed a multitude of Distributed Denial of Service (DDoS) attacks against educational institutions. These attacks were effective enough to cause the online exams of hundreds of students to be cancelled. Surprisingly, these attacks were purchased by students from websites, known as Booters. These sites provide DDoS attacks as a paid service (DDoS-as-a-Service) at costs starting from 1 USD. Since this problem was first identified by SURFnet,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
98
1
3

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 131 publications
(120 citation statements)
references
References 13 publications
1
98
1
3
Order By: Relevance
“…Four publicly available datasets were used from which we created a unique dataset of 4986 network traffic records [15], [16], [17]. Each of the used sets of records contained certain classes of traffic:…”
Section: A Data Collection and Normalizationmentioning
confidence: 99%
“…Four publicly available datasets were used from which we created a unique dataset of 4986 network traffic records [15], [16], [17]. Each of the used sets of records contained certain classes of traffic:…”
Section: A Data Collection and Normalizationmentioning
confidence: 99%
“…Such websites, which are called "Booters" or Stressers", are able to generate attacks with strengths of many Gbps. A simple Google search shows that hundreds of such Booters are currently active; the costs to perform a series of attacks is typically a few dollars [1] [2]. In general Booters do not attack their targets directly, but use one or two levels of intermediate systems to strengthen and anonymise the attacks.…”
Section: Current Ddos Attacksmentioning
confidence: 99%
“…To understand how Booters operate, we will discuss a series of attacks which we performed on our own infrastructure [2]. Nine Booters were used; two of which generated so-called CharGen attacks whereas the other seven performed DNS amplification attacks.…”
Section: Analysis Of Current Ddos Attacksmentioning
confidence: 99%
“…First, it is known that some booters owners use copies of source codes easily found on the Internet to create their booter [80]. Another explanation is that there are multiple booters that have the same owner, and also same database structure [81]. In section 3.5, we compare the records from booter databases to reveal whether they are copies of each other (i.e., exact same record).…”
Section: Methodology and Our Database Schemamentioning
confidence: 99%
“…One of the main arguments for this, presented in the next chapter, is that the attack infrastructure used by booters mostly consists of compromised/misused machines (e.g., botnets and amplifier services). Others have attested to this argument by hiring attacks from booters and testing them against controlled environments [39,17,81];…”
Section: Ranking Bootersmentioning
confidence: 99%