2006
DOI: 10.1145/1132026.1132027
|View full text |Cite
|
Sign up to set email alerts
|

Inferring Internet denial-of-service activity

Abstract: In this paper, we seek to answer a simple question: "How prevalent are denial-of-service attacks in the Internet today?". Our motivation is to understand quantitatively the nature of the current threat as well as to enable longerterm analyses of trends and recurring patterns of attacks. We present a new technique, called "backscatter analysis", that provides an estimate of worldwide denial-ofservice activity. We use this approach on three week-long datasets to assess the number, duration and focus of attacks, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
345
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 735 publications
(361 citation statements)
references
References 5 publications
2
345
0
Order By: Relevance
“…Aside from DNS mapping efforts, there should not be any legitimate DNS traffic for such an unused address space. We postulate that the observed dark DNS activity falls into the following classifications: (1) DNS mapping efforts such as that by Internet Systems Consortium [22], (2) backscatter [23] due to spoofed darknet traffic triggering subsequent DNS queries by monitoring systems, (3) misconfiguration, (4) PTR reconnaissance by malicious entities to identify live hosts for attack targeting. Table 2 illustrates the basic statistics of our three datasets.…”
Section: Discussionmentioning
confidence: 99%
“…Aside from DNS mapping efforts, there should not be any legitimate DNS traffic for such an unused address space. We postulate that the observed dark DNS activity falls into the following classifications: (1) DNS mapping efforts such as that by Internet Systems Consortium [22], (2) backscatter [23] due to spoofed darknet traffic triggering subsequent DNS queries by monitoring systems, (3) misconfiguration, (4) PTR reconnaissance by malicious entities to identify live hosts for attack targeting. Table 2 illustrates the basic statistics of our three datasets.…”
Section: Discussionmentioning
confidence: 99%
“…• Availability: To our best knowledge there is no reliable data regarding denial-of-service (DoS) attacks on VPNs as operators do not publish figures for security reasons and the common backscatter analysis [25] cannot detect DoS attacks on VPNs. However, DoS attacks are expected to be become increasingly important as DoS attacks are very cheap to realize and yet effective [26].…”
Section: Security Objectivesmentioning
confidence: 99%
“…Also, infected computers may join a botnet [5], a large collection of compromised hosts controlled by the attacker. The computational power of compromised hosts are valuable for attackers as these hosts can be misused for spam campaigns [17] or denial of service attacks [20].…”
Section: Introductionmentioning
confidence: 99%