2015
DOI: 10.1016/j.comcom.2015.01.016
|View full text |Cite
|
Sign up to set email alerts
|

Inferring distributed reflection denial of service attacks from darknet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(26 citation statements)
references
References 18 publications
0
23
0
1
Order By: Relevance
“…The software and network entry points are hard to enumerate and are subject to change. Entry points for hardware attacks are fewer and moderately well determined but attack targets can be diverse, targeting for example, information leakage [71], tampering [72], denial of service (DoS) [73], or cloning [59]. For each threat type, threat analysis needs to identify and describe activities which may allow the relevant vulnerability to be exploited (Table 1).…”
Section: Monitoring Systems Security In Industrial Environmentsmentioning
confidence: 99%
See 1 more Smart Citation
“…The software and network entry points are hard to enumerate and are subject to change. Entry points for hardware attacks are fewer and moderately well determined but attack targets can be diverse, targeting for example, information leakage [71], tampering [72], denial of service (DoS) [73], or cloning [59]. For each threat type, threat analysis needs to identify and describe activities which may allow the relevant vulnerability to be exploited (Table 1).…”
Section: Monitoring Systems Security In Industrial Environmentsmentioning
confidence: 99%
“…All communications apply AES 256 encryption. The test aimed to simulate a denial of service (DoS) [73] via the network. The attacker gained network access through any of the earlier mentioned methods and is ready to generate connection requests to the communication module using its source address rather than the attack target.…”
Section: Pilot Implementation and Testingmentioning
confidence: 99%
“…There have been several papers focusing on the characterisation of darknet data [4], [10]. Rather than analyzing full darknet data, examining selected traffic is helpful to address a particular threat, as for example DNS queries to identify Dr-DOS (Distributed Reflection Denial of Service) [11]. Fachkha et al [4], have provided a study of darknet data and the attack activities that could be investigated throughout its data.…”
Section: Background and Related Workmentioning
confidence: 99%
“…However, there is a lack of research on multiprotocol DRDoS attacks, where a victim is attacked using multiple amplification protocols simultaneously, which is an emerging trend in the DDoS scene [21]. Most existing research considers either individual protocols [1,5,7,25,27], or multiple protocols in isolation from each other [9,10,22,26,29]. Another trend in DRDoS are carpet bombing attacks, which target multiple IP addresses in the same subnet (instead of a single IP address) in order to evade detection while still being able to cause disruption by flooding access links.…”
Section: Introductionmentioning
confidence: 99%