Proceedings of the 2014 Conference on Internet Measurement Conference 2014
DOI: 10.1145/2663716.2663717
|View full text |Cite
|
Sign up to set email alerts
|

Taming the 800 Pound Gorilla

Abstract: Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP) amplification, which became prominent in December 2013, have received significant global attention. We chronicle how this attack rapidly rose from obscurity to become the dominant large DDoS vector. Via the lens of five distinct datasets, we characterize the advent and evolution of these attacks. Through a dataset that measures a large fraction of global Internet traffic, we show a three order of magnitude rise in NTP. Using a la… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 109 publications
(24 citation statements)
references
References 13 publications
0
24
0
Order By: Relevance
“…Czyz et al [4] examined five datasets on NTP attacks dating from 2013 and 2014. They found that the volume of NTP attack traffic rose rapidly but fell after February 2014, possibly due to reconfiguration of NTP servers to prevent amplified reflection.…”
Section: Related Workmentioning
confidence: 99%
“…Czyz et al [4] examined five datasets on NTP attacks dating from 2013 and 2014. They found that the volume of NTP attack traffic rose rapidly but fell after February 2014, possibly due to reconfiguration of NTP servers to prevent amplified reflection.…”
Section: Related Workmentioning
confidence: 99%
“…There is support through NTP to compare internal diagnostics of server synchronization quality to select a preferred peer and to inform clients, but the performance of this mechanism is variable and does not in any case constitute independent validation. From the perspective of the typical client, judging its server is inherently 1 The interesting question of exactly how large this proportion is has become much harder to answer following the blocking of diagnostic NTP queries since late 2013, due to their exploitation in DDOS attack amplification [2].…”
Section: Introductionmentioning
confidence: 99%
“…Research shows that some botnets use recognizable values for the source port, TTL, or DNS values [13]. For example, the ports 80 and 123 are often found paired with NTP (port 123) attacks [12], [13], [17] and make up more than 50% of the attacks together. Protocol specific observations show that source port selection differs among protocols [16]: attacks using CharGen, QOTD, RIP, and SSDP exhibit a hard-coded, stable paired port almost exclusively while NTP and DNS attacks show a larger range of randomized ports (about 50%).…”
Section: Detecting Attacksmentioning
confidence: 99%
“…This observation confirms common expectations, which assume attackers choose protocols that allow for high amplification and provide a rich amplifier infrastructure. NTP, for example, does not only provide the highest amplification factor and many amplifiers but also megaamplifiers [17], i.e., hosts that exhibit a significantly larger amplification factor due to their configuration, making this protocol most appealing for attacks.…”
Section: Evading Threshold-based Detectionmentioning
confidence: 99%