2014 23rd International Conference on Computer Communication and Networks (ICCCN) 2014
DOI: 10.1109/icccn.2014.6911808
|View full text |Cite
|
Sign up to set email alerts
|

The store-and-flood distributed reflective denial of service attack

Abstract: Distributed reflective denial of service (DRDoS) attacks, especially those based on UDP reflection and amplification, can generate hundreds of gigabits per second of attack traffic, and have become a significant threat to Internet security. In this paper we show that an attacker can further make the DRDoS attack more dangerous. In particular, we describe a new DRDoS attack called store-and-flood DRDoS, or SF-DRDoS. By leveraging peerto-peer (P2P) file-sharing networks, SF-DRDoS becomes more surreptitious and p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Increasingly rampant DDoS attacks, particularly attacks by DRDoS with UDPs, have become a global problem [29], [30]. DRDoS attacks, which focus on UDP reflection and amplification, can produce hundreds of gigabits per second of attack traffic, and has become a major threat to internet safety [31]. These attacks violate UDP-based network protocols that send a higher response compared with the request size.…”
Section: Classification Of Drdos Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Increasingly rampant DDoS attacks, particularly attacks by DRDoS with UDPs, have become a global problem [29], [30]. DRDoS attacks, which focus on UDP reflection and amplification, can produce hundreds of gigabits per second of attack traffic, and has become a major threat to internet safety [31]. These attacks violate UDP-based network protocols that send a higher response compared with the request size.…”
Section: Classification Of Drdos Attacksmentioning
confidence: 99%
“…Thus, in our research area, we aim to shed light on the techniques used to detect and mitigate the BGP protocol by DRDoS attack. TCPbased DRDoS attacks were studied, but they only occur during the link establishment step due to the threeway handshake procedure and have no major amplification impact [31]. The protocols based on TCP, such as FTP and Telnet, have the highest number of amplifiers, as shown by data from scanning a random IP address for the popular protocols [34].…”
Section: Drdos Attacks Based On Tcp Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…A successful DoS attack against a VoIP network requires the IP addresses of the SIP server and the SIP clients, and the IDs of the SIP users [38]. We obtain these parameters using our attack tool Mr.SIP's Network Scanner and SIP Enumerator modules.…”
Section: B Sr-drdos Attack Flowmentioning
confidence: 99%