Proceedings 2014 Network and Distributed System Security Symposium 2014
DOI: 10.14722/ndss.2014.23233
|View full text |Cite
|
Sign up to set email alerts
|

Amplification Hell: Revisiting Network Protocols for DDoS Abuse

Abstract: In distributed reflective denial-of-service (DRDoS) attacks, adversaries send requests to public servers (e.g., open recursive DNS resolvers) and spoof the IP address of a victim. These servers, in turn, flood the victim with valid responses and-unknowingly-exhaust its bandwidth. Recently, attackers launched DRDoS attacks with hundreds of Gb/s bandwidth of this kind. While the attack technique is well-known for a few protocols such as DNS, it is unclear if further protocols are vulnerable to similar or worse a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

6
248
0
10

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 284 publications
(282 citation statements)
references
References 19 publications
6
248
0
10
Order By: Relevance
“…It efficiently blocks non-spoofed bandwidth DoS attack packets, sent directly to the victim, as illustrated by Attacker 1 in Figure 8. In practice, non-spoofed attack packets are widely used in BW-DoS attacks, as they are easier to generate by attackers, since they can be sent by benign reflectors [29], [35], and clients running unprivileged malware and/or behind NATs or ingress-filtering routers.…”
Section: A Dynamic Whitelist Filteringmentioning
confidence: 99%
“…It efficiently blocks non-spoofed bandwidth DoS attack packets, sent directly to the victim, as illustrated by Attacker 1 in Figure 8. In practice, non-spoofed attack packets are widely used in BW-DoS attacks, as they are easier to generate by attackers, since they can be sent by benign reflectors [29], [35], and clients running unprivileged malware and/or behind NATs or ingress-filtering routers.…”
Section: A Dynamic Whitelist Filteringmentioning
confidence: 99%
“…Scan and backscatter analysis and detection were covered in Refs. [5], [21], [28]. Continuous efforts have been made to tackle Conficker throughout the years [13], [26], [27].…”
Section: Related Workmentioning
confidence: 99%
“…RELATED WORK C Rossow et al [7] analysed UDP amplification attacks to expose the risk of existing vulnerabilities with network protocols. Bait servers were deployed and back scatter analysis was performed to provide insight into their current usage.…”
Section: Http/2 Potential Vulnerabilitiesmentioning
confidence: 99%