DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks
Autor: | Timm Böttger, Helmut Reiser, Lothar Braun, Felix von Eye, Georg Carle, Oliver Gasser |
---|---|
Přispěvatelé: | Technische Universität Munchen - Université Technique de Munich [Munich, Allemagne] (TUM), Leibniz Supercomputing Centre (LRZ), Moritz Steiner, Pere Barlet-Ros, Olivier Bonaventure, TC 6, WG 6.6 |
Rok vydání: | 2015 |
Předmět: |
Service (systems architecture)
Third party Computer science business.industry Amplifier Computer security computer.software_genre [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] Gigabit [INFO]Computer Science [cs] The Internet business computer Protocol (object-oriented programming) Computer network |
Zdroj: | Traffic Monitoring and Analysis ISBN: 9783319171715 TMA Lecture Notes in Computer Science 7th Workshop on Traffic Monitoring and Analysis (TMA) 7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.205-218, ⟨10.1007/978-3-319-17172-2_14⟩ |
DOI: | 10.1007/978-3-319-17172-2_14 |
Popis: | Part 5: New Protocols; International audience; For many years Distributed Denial-of-Service attacks have been known to be a threat to Internet services. Recently a configuration flaw in NTP daemons led to attacks with traffic rates of several hundred Gbit/s. For those attacks a third party, the amplifier, is used to significantly increase the volume of traffic reflected to the victim. Recent research revealed more UDP-based protocols that are vulnerable to amplification attacks. Detecting such attacks from an abused amplifier network’s point of view has only rarely been investigated.In this work we identify novel properties which characterize amplification attacks and allow to identify the illegitimate use of arbitrary services.Their suitability for amplification attack detection is evaluated in large high-speed research networks. We prove that our approach is fully capable of detecting attacks that were already seen in the wild as well as capable of detecting attacks we conducted ourselves exploiting newly discovered vulnerabilities. |
Databáze: | OpenAIRE |
Externí odkaz: |