A review of amplification-based distributed denial of service attacks and their mitigation

被引:18
作者
Ismail, Salih [1 ]
Hassen, Hani Ragab [3 ]
Just, Mike [2 ]
Zantout, Hind [1 ]
机构
[1] Heriot Watt Univ, Dubai, U Arab Emirates
[2] Heriot Watt Univ, Edinburgh EH14 4AS, Midlothian, Scotland
[3] Heriot Watt Univ, Inst Cybersecur & Safety, Dubai, U Arab Emirates
关键词
Amplification attack; Reflection attack; DDoS; DDOS ATTACKS; TAXONOMY; DRDOS; DOS;
D O I
10.1016/j.cose.2021.102380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of Distributed Denial of Service (DDoS) attacks have been steady in terms of the frequency and the impact of the attack. Traditionally, the attackers required control of a huge amount of resources to launch an attack. This has changed with the use of reflectors and amplifiers in DDoS attacks. A recent shift consisted of using other protocols than the traditional NTP and DNS protocols which were heavily used for ADDoS. In this paper, we review and organize amplification-based DDoS (ADDoS) attacks and associated countermeasures into a new taxonomy. Furthermore, we present a modus operandi of ADDoS attacks and analyze how it differs from traditional DDoS attacks. We also investigate how accessible ADDoS are for attackers with average resources. We survey readily available open-source scripts on GitHub and also the ADDoS features available in hire-to-DDoS platforms. We believe that accessibility and low-cost of hire-to-DDoS platforms are the major reasons for the increase of amplification-based DDoS attacks. Lastly, we provide a list of future directions that might be interesting for the community to focus on. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:22
相关论文
共 102 条
  • [1] Aizuddin AA, 2017, P 11 INT C UB INF MA, P1
  • [2] Akamai, 2018, MEMC FUELD 1 3 TBPS
  • [3] akamai, THREAT ADV INT THING
  • [4] Alexander Khalimonenko, 2018, TECHNICAL REPORT DDO
  • [5] DNS amplification attack revisited
    Anagnostopoulos, Marios
    Kambourakis, Georgios
    Kopanos, Panagiotis
    Louloudakis, Georgios
    Gritzalis, Stefanos
    [J]. COMPUTERS & SECURITY, 2013, 39 : 475 - 485
  • [6] [Anonymous], 2018, GITHUB SHADOWHATESYO
  • [7] [Anonymous], 2017, R: The R Project for Statistical Computing
  • [8] [Anonymous], 2019, GITHUB TONY2037 DNS
  • [9] [Anonymous], 2015, P INFORM SECURITY S
  • [10] [Anonymous], 2019, GITHUB HACKER900123