A review of amplification-based distributed denial of service attacks and their mitigation

被引:18
作者
Ismail, Salih [1 ]
Hassen, Hani Ragab [3 ]
Just, Mike [2 ]
Zantout, Hind [1 ]
机构
[1] Heriot Watt Univ, Dubai, U Arab Emirates
[2] Heriot Watt Univ, Edinburgh EH14 4AS, Midlothian, Scotland
[3] Heriot Watt Univ, Inst Cybersecur & Safety, Dubai, U Arab Emirates
关键词
Amplification attack; Reflection attack; DDoS; DDOS ATTACKS; TAXONOMY; DRDOS; DOS;
D O I
10.1016/j.cose.2021.102380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of Distributed Denial of Service (DDoS) attacks have been steady in terms of the frequency and the impact of the attack. Traditionally, the attackers required control of a huge amount of resources to launch an attack. This has changed with the use of reflectors and amplifiers in DDoS attacks. A recent shift consisted of using other protocols than the traditional NTP and DNS protocols which were heavily used for ADDoS. In this paper, we review and organize amplification-based DDoS (ADDoS) attacks and associated countermeasures into a new taxonomy. Furthermore, we present a modus operandi of ADDoS attacks and analyze how it differs from traditional DDoS attacks. We also investigate how accessible ADDoS are for attackers with average resources. We survey readily available open-source scripts on GitHub and also the ADDoS features available in hire-to-DDoS platforms. We believe that accessibility and low-cost of hire-to-DDoS platforms are the major reasons for the increase of amplification-based DDoS attacks. Lastly, we provide a list of future directions that might be interesting for the community to focus on. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:22
相关论文
共 102 条
  • [11] [Anonymous], 2019, GITHUB DAVID9705 DNS
  • [12] Apache Software Foundation, 2008, HAD MAP RED TUT
  • [13] Apache Software Foundation, 2013, CHUKW AP
  • [14] Aupetit M., 2016, P IEEE S VIS CYB SEC, P1, DOI 10.1109/VIZSEC.2016.7739577
  • [15] Beckett David, 2017, 2017 Seventh International Conference on Emerging Security Technologies (EST), P128, DOI 10.1109/EST.2017.8090411
  • [16] Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment
    Bhushan, Kriti
    Gupta, B. B.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) : 1985 - 1997
  • [17] Biagioni E, 2019, INT CONF COMPUT NETW, P78, DOI [10.1109/iccnc.2019.8685648, 10.1109/ICCNC.2019.8685648]
  • [18] DoS Amplification Attacks - Protocol-Agnostic Detection of Service Abuse in Amplifier Networks
    Boettger, Timm
    Braun, Lothar
    Gasser, Oliver
    von Eye, Felix
    Reiser, Helmut
    Carle, Georg
    [J]. TRAFFIC MONITORING AND ANALYSIS, TMA 2015, 2015, 9053 : 205 - 218
  • [19] Bohte E, 2018, EVALUATION CURRENT S
  • [20] Bombarding, 2016, GITHUB BOMB DNS AMP