Hyslip et al., 2019 - Google Patents
Assessing the capacity of DRDoS-for-hire services in cybercrime marketsHyslip et al., 2019
- Document ID
- 4420779734933504640
- Author
- Hyslip T
- Holt T
- Publication year
- Publication venue
- Deviant Behavior
External Links
Snippet
Over the last few years the market for distributed denial of service (DDoS) attacks has changed from a pay-per-attack model executed by botnets, to a subscription service of booters and stressers where “subscribers” launch their own attacks through a web-based …
- 230000003321 amplification 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
- H04L43/062—Report generation for traffic related reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1003—Signalling or session protocols
- H04L65/1006—SIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/60—Media handling, encoding, streaming or conversion
- H04L65/601—Media manipulation, adaptation or conversion
- H04L65/605—Media manipulation, adaptation or conversion intermediate
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/40—Services or applications
- H04L65/4069—Services related to one way streaming
- H04L65/4076—Multicast or broadcast
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hyslip et al. | Assessing the capacity of DRDoS-for-hire services in cybercrime markets | |
US9942250B2 (en) | Network appliance for dynamic protection from risky network activities | |
Sivakorn et al. | The cracked cookie jar: HTTP cookie hijacking and the exposure of private information | |
Santanna et al. | Booters—An analysis of DDoS-as-a-service attacks | |
Schiller et al. | Botnets: The killer web applications | |
Srinivasan et al. | A survey on the impact of DDoS attacks in cloud computing: prevention, detection and mitigation techniques | |
Gugelmann et al. | An automated approach for complementing ad blockers’ blacklists | |
Perta et al. | A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients | |
US20170230390A1 (en) | Method And System For Uniquely Identifying A User Computer In Real Time Using A Plurality Of Processing Parameters And Servers | |
Krupp et al. | Linking amplification DDoS attacks to booter services | |
Simeonovski et al. | Who controls the internet? analyzing global threats using property graph traversals | |
Gupta et al. | Emerging phishing trends and effectiveness of the anti-phishing landing page | |
Gardiner et al. | Command & Control: Understanding, Denying and Detecting-A review of malware C2 techniques, detection and defences | |
Zhou | A survey on fast-flux attacks | |
Chiapponi et al. | Badpass: Bots taking advantage of proxy as a service | |
Negash et al. | An overview of modern botnets | |
Srinivasan et al. | Understanding cross-channel abuse with sms-spam support infrastructure attribution | |
Pihelgas | Back-tracing and Anonymity in Cyberspace | |
Aravind et al. | Tracing IP Addresses Behind Vpn/Proxy Servers | |
Sperotto et al. | Distributed ddos defense: A collaborative approach at internet scale | |
Dai Nguyen et al. | C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks | |
Wardman et al. | A practical analysis of the rise in mobile phishing | |
Kropotov et al. | The hacker infrastructure and underground hosting: Services used by criminals | |
Marchetti et al. | Cyber attacks on financial critical infrastructures | |
Khan et al. | A First Look at User-Installed Residential Proxies From a Network Operator’s Perspective |