2014 6th International Conference on New Technologies, Mobility and Security (NTMS) 2014
DOI: 10.1109/ntms.2014.6814019
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting Internet DNS Amplification DDoS Activities

Abstract: This work proposes a novel approach to infer and characterize Internet-scale DNS amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) activities using darknet, this work shows that we can extract DDoS activities without relying on backscattered analysis. The aim of this work is to extract cyber security intelligence related to DNS Amplification DDoS activities such as detection period, attack duration, intensity, packet … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
4
2

Relationship

3
7

Authors

Journals

citations
Cited by 39 publications
(18 citation statements)
references
References 16 publications
0
17
0
Order By: Relevance
“…An attack that is similar to Smurf and Fraggle attacks is the DNS amplification attack [5][6][7]. Through various techniques, the attacker turns a small DNS query into a much larger payload directed at the target network.…”
Section: Attacks From An External Networkmentioning
confidence: 99%
“…An attack that is similar to Smurf and Fraggle attacks is the DNS amplification attack [5][6][7]. Through various techniques, the attacker turns a small DNS query into a much larger payload directed at the target network.…”
Section: Attacks From An External Networkmentioning
confidence: 99%
“…Since then, the focus of network telescope studies has shifted several times, closely following the volatile nature of new threat actors. For instance, some of the important contributions that demonstrate the evolution of telescope research include the discovery of the relationship between backscatter traffic and DDoS attacks in 2001 [60], worm propagation analysis between 2003 and 2005 [61,62], the use of time series and data mining techniques on telescope traffic in 2008 [63], the monitoring of large-scale cyber events through telescope in 2012 [64], and more recently, the study of amplification attacks using telescope sensors in 2013 and 2014 [65,66]. In contrast, this work proposes and evaluates a formal probabilistic preprocessing model for network telescope traffic in an effort to fingerprint and filter out misconfiguration traffic.…”
Section: Network Telescope: Measurements and Analysismentioning
confidence: 99%
“…In another DDoS cases, the attacker flood the Internet with requests spoofed by the address of the victim. Hence, all open services (e.g., DNS resolver) found online will reply to the victim with amplified replies [36]. For all aforementioned cases, while generating these malicious activities, some of this traffic might reach the darknet sensor and hence become available for IT investigators.…”
Section: Darknet Datamentioning
confidence: 99%