2016
DOI: 10.1007/978-3-319-45719-2_17
|View full text |Cite
|
Sign up to set email alerts
|

Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0
4

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(43 citation statements)
references
References 16 publications
0
39
0
4
Order By: Relevance
“…Krupp et al were able to attribute 26% of DNS and 13% of NTP attacks to specific booters which they had bought attacks from [40]. Noroozian et al found that over 48% of UDP reflection attacks and 62% of victims are on IP addresses in access networks [48], Sharma found that 89% of US, 98% of UK, 71% of FR, and 89% of DE victims were home users [57]. Sharma also found that over 50% of attacks were less than 5 minutes.…”
Section: Datasetsmentioning
confidence: 99%
See 2 more Smart Citations
“…Krupp et al were able to attribute 26% of DNS and 13% of NTP attacks to specific booters which they had bought attacks from [40]. Noroozian et al found that over 48% of UDP reflection attacks and 62% of victims are on IP addresses in access networks [48], Sharma found that 89% of US, 98% of UK, 71% of FR, and 89% of DE victims were home users [57]. Sharma also found that over 50% of attacks were less than 5 minutes.…”
Section: Datasetsmentioning
confidence: 99%
“…Although DoS attacks can be directed anywhere and be for any purpose, prior studies have shown that most attacks are on end-users (assumed to be games players) and on gaming related websites [7,48]. Sharma showed that timezone determines when peak attacks occur [57] and we take the view that there will be a significant correlation between the country of the attacker and the country of the victim.…”
Section: Analysing By Countrymentioning
confidence: 99%
See 1 more Smart Citation
“…As the majority of them stem from booter services [19,20], they are usually shorter than 300 s [21]. After that, the network returns to regular traffic, and the attacker nodes stop adding new packets in the system.…”
Section: Simulation Detailsmentioning
confidence: 99%
“…An extensive body of research on booters is available. These studies cover multiple lines of research including analyses of (1) the booters' leaked databases [10,21,23], (2) booter attacks [8,24,47,57], (3) victims of booters [38], (4) honeypots of servers commonly used for performing booter attacks [25,52], (5) the usage of these honeypots for attribution purposes [31], (6) TLS certificates used by booters [32], (7) booter blacklists and their origins [12,44,46,59], (8) the usage of these blacklists to understand the booter market [45], (9) ethical and legal aspects related to booters [16,18], and (10) the impact of law enforcement operations on booters from a commercial perspective [7,13]. Our contribution.…”
mentioning
confidence: 99%