Proceedings of the Internet Measurement Conference 2018 2018
DOI: 10.1145/3278532.3278571
|View full text |Cite
|
Sign up to set email alerts
|

A First Joint Look at DoS Attacks and BGP Blackholing in the Wild

Abstract: BGP blackholing is an operational countermeasure that builds upon the capabilities of BGP to achieve DoS mitigation. Although empirical evidence of blackholing activities are documented in literature, a clear understanding of how blackholing is used in practice when attacks occur is still missing. This paper presents a first joint look at DoS attacks and BGP blackholing in the wild. We do this on the basis of two complementary data sets of DoS attacks, inferred from a large network telescope and DoS honeypots,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 23 publications
2
9
0
Order By: Relevance
“…Only in 19 cases we record a delay greater than 30 min, with the highest delay being 5 h for an 8-h long attack. These findings are similar to prior work [30], that describes a delay of <10 min for 84.2% within their data set. The low attack volume in relation to the port capacity of blackholing events, in combination with the short delay, suggest an automation of the blackholing mitigation.…”
Section: Infrastructure Perspectivesupporting
confidence: 91%
See 1 more Smart Citation
“…Only in 19 cases we record a delay greater than 30 min, with the highest delay being 5 h for an 8-h long attack. These findings are similar to prior work [30], that describes a delay of <10 min for 84.2% within their data set. The low attack volume in relation to the port capacity of blackholing events, in combination with the short delay, suggest an automation of the blackholing mitigation.…”
Section: Infrastructure Perspectivesupporting
confidence: 91%
“…To mitigate these attacks in practice, various reactive DDoS detection and defense techniques filter unwanted traffic of ongoing attacks, e.g., scrubbing services [2, 23,29,43,63], blackholing [20,21,29,30], or ACLs and Flowspec [16,48]. In this arms race, spontaneously appearing new amplification vectors are quickly growing to cause substantial harm to even well positioned networks and applications [42,65].…”
Section: Introductionmentioning
confidence: 99%
“…Darknet data have been utilized to study DDoS attacks [9,10,15,42], DoS attacks and BGP blackholing [25], IPv6 routing instabilities [11], and long-term cyber attacks [4]. Application-level responses to IBR observed in Darknet have also been used to characterize Internet-wide scanning activities [33].…”
Section: Related Workmentioning
confidence: 99%
“…Jonker et al 55 performed empirical observation of DDoS events and corresponding BGP blackholing events. They utilized two data sets of DDoS attack (from an Internet telescope and amplification honeypots) and one data set of BGP blackholing events (from public BGP route collectors), from March 1, 2015, through March 5, 2018.…”
Section: Related Workmentioning
confidence: 99%