2017
DOI: 10.1109/mcom.2017.1600980
|View full text |Cite
|
Sign up to set email alerts
|

Demystifying DDoS as a Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 10 publications
0
5
0
1
Order By: Relevance
“…Existem alguns trabalhos que analisam serviços que efetuam ataques DDoS mediante pagamento (booters) [Santanna et al 2015, Zand et al 2017]. Estes trabalhos concentram-se nas características do tráfego gerado por esses booters, desconsiderando as vítimas.…”
Section: Trabalhos Relacionadosunclassified
“…Existem alguns trabalhos que analisam serviços que efetuam ataques DDoS mediante pagamento (booters) [Santanna et al 2015, Zand et al 2017]. Estes trabalhos concentram-se nas características do tráfego gerado por esses booters, desconsiderando as vítimas.…”
Section: Trabalhos Relacionadosunclassified
“…We start by taking a victim's perspective to study the potential damage that booter-based DDoS attacks can (a) directly cause to their target (thereby updating earlier findings on booter attack characteristics [8,24,47,57]) and (b) the collateral damage to Internet infrastructure caused by carrying attack traffic. We do so by purchasing services from popular booters to attack our dedicated…”
Section: Booter: a Victim's Perspectivementioning
confidence: 99%
“…An extensive body of research on booters is available. These studies cover multiple lines of research including analyses of (1) the booters' leaked databases [10,21,23], (2) booter attacks [8,24,47,57], (3) victims of booters [38], (4) honeypots of servers commonly used for performing booter attacks [25,52], (5) the usage of these honeypots for attribution purposes [31], (6) TLS certificates used by booters [32], (7) booter blacklists and their origins [12,44,46,59], (8) the usage of these blacklists to understand the booter market [45], (9) ethical and legal aspects related to booters [16,18], and (10) the impact of law enforcement operations on booters from a commercial perspective [7,13]. Our contribution.…”
mentioning
confidence: 99%
“…A group of these zombies under the control of an attacker constitutes a botnet that enables the attacker to perform a distributed attack. Nowadays, even DDoS as a service (DaaS) is available [1]. The DaaS providers sell their services at a very low cost (from 1 USD), and directly via websites (called booters).…”
Section: Introductionmentioning
confidence: 99%
“…The DDoS attacks may be broadly categorised into 1) extensive and 2) intensive [1]. The extensive attacks are based on generating a massive volume of relatively simple traffic.…”
Section: Introductionmentioning
confidence: 99%