2005
DOI: 10.1007/11555827_19
|View full text |Cite
|
Sign up to set email alerts
|

Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks

Abstract: Zusammenfassung. Denial-of-Service (DoS) attacks pose a significant threat to the Internet today especially if they are distributed, i.e., launched simultaneously at a large number of systems. Reactive techniques that try to detect such an attack and throttle down malicious traffic prevail today but usually require an additional infrastructure to be really effective. In this paper we show that preventive mechanisms can be as effective with much less effort: We present an approach to (distributed) DoS attack pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
97
0
2

Year Published

2006
2006
2018
2018

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 170 publications
(99 citation statements)
references
References 9 publications
0
97
0
2
Order By: Relevance
“…The C&C server's address will then be put into the sinkhole DNS database. Then, every connection trying to contact this server will receive the loopback address 127.0.0.1 instead of the real IP address of the C&C server [12].…”
Section: Standard Proceduresmentioning
confidence: 99%
“…The C&C server's address will then be put into the sinkhole DNS database. Then, every connection trying to contact this server will receive the loopback address 127.0.0.1 instead of the real IP address of the C&C server [12].…”
Section: Standard Proceduresmentioning
confidence: 99%
“…The victim system cannot add source IP addresses to the blacklist, because they act as a regular end-user. Evidence reveals that most commonly implemented by botnets are TCP SYN and UDP flooding attacks (Freiling, Holz, & Wicherski, 2005). Exploring the bots in a managed honeypot is one of the most effective prevention mechanisms, which will be discussed in the following chapters.…”
Section: Botnet Attacksmentioning
confidence: 99%
“…A completely different approach is instead followed in the context of the mwcollect project [13,14], that has recently merged with the nepenthes project. These tools use a set of vulnerability modules to attract bots, analyze their shell code and use download modules to fetch the malware code from the attacking bot.…”
Section: State Of the Artmentioning
confidence: 99%