2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) 2015
DOI: 10.1109/inm.2015.7140320
|View full text |Cite
|
Sign up to set email alerts
|

Inside booters: An analysis on operational databases

Abstract: Abstract-Distributed Denial of Service (DDoS) attacks are an increasing threat on the Internet. One of the reasons is that websites selling attacks for prices starting from $1.00 are becoming popular. These websites, called Booters, facilitate attacks by making transparent the needed infrastructure to perform attacks and by lowering the knowledge to control it. As a consequence, any user on the Internet is able to launch attacks at any time. Although security experts and operators acknowledge the potential of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 3 publications
0
13
0
Order By: Relevance
“…Although there is a vast amount of literature on DDoS attacks and mitigation techniques [5], [6], [7], [8], [9], this paper is, to the best of our knowledge, the first to present a structured analysis of several DDoS-as-a-Service providers. Karami et al [10], [3] investigate Booters as well, using a similar approach but focus on a single Booter only.…”
Section: Introductionmentioning
confidence: 99%
“…Although there is a vast amount of literature on DDoS attacks and mitigation techniques [5], [6], [7], [8], [9], this paper is, to the best of our knowledge, the first to present a structured analysis of several DDoS-as-a-Service providers. Karami et al [10], [3] investigate Booters as well, using a similar approach but focus on a single Booter only.…”
Section: Introductionmentioning
confidence: 99%
“…As the majority of them stem from booter services [19,20], they are usually shorter than 300 s [21]. After that, the network returns to regular traffic, and the attacker nodes stop adding new packets in the system.…”
Section: Simulation Detailsmentioning
confidence: 99%
“…The majority of Booter customers are teenagers that attack one another's residential connection to gain advantage in online gaming; and most attacks from Booters typically last up to 5 minutes and send traffic at rates up to 10 Gbps . Some Booter outliers, however, are able to deliver significantly more powerful attacks, eg, 100 Gbps, which can cause serious problems on targets that lack proper defense.…”
Section: Introductionmentioning
confidence: 99%