[go: up one dir, main page]

Hyslip et al., 2019 - Google Patents

Assessing the capacity of DRDoS-for-hire services in cybercrime markets

Hyslip et al., 2019

Document ID
4420779734933504640
Author
Hyslip T
Holt T
Publication year
Publication venue
Deviant Behavior

External Links

Snippet

Over the last few years the market for distributed denial of service (DDoS) attacks has changed from a pay-per-attack model executed by botnets, to a subscription service of booters and stressers where “subscribers” launch their own attacks through a web-based …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations contains provisionally no documents
    • H04L12/18Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/06Report generation
    • H04L43/062Report generation for traffic related reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1003Signalling or session protocols
    • H04L65/1006SIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/60Media handling, encoding, streaming or conversion
    • H04L65/601Media manipulation, adaptation or conversion
    • H04L65/605Media manipulation, adaptation or conversion intermediate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/40Services or applications
    • H04L65/4069Services related to one way streaming
    • H04L65/4076Multicast or broadcast

Similar Documents

Publication Publication Date Title
Hyslip et al. Assessing the capacity of DRDoS-for-hire services in cybercrime markets
US9942250B2 (en) Network appliance for dynamic protection from risky network activities
Sivakorn et al. The cracked cookie jar: HTTP cookie hijacking and the exposure of private information
Santanna et al. Booters—An analysis of DDoS-as-a-service attacks
Schiller et al. Botnets: The killer web applications
Srinivasan et al. A survey on the impact of DDoS attacks in cloud computing: prevention, detection and mitigation techniques
Gugelmann et al. An automated approach for complementing ad blockers’ blacklists
Perta et al. A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients
US20170230390A1 (en) Method And System For Uniquely Identifying A User Computer In Real Time Using A Plurality Of Processing Parameters And Servers
Krupp et al. Linking amplification DDoS attacks to booter services
Simeonovski et al. Who controls the internet? analyzing global threats using property graph traversals
Gupta et al. Emerging phishing trends and effectiveness of the anti-phishing landing page
Gardiner et al. Command & Control: Understanding, Denying and Detecting-A review of malware C2 techniques, detection and defences
Zhou A survey on fast-flux attacks
Chiapponi et al. Badpass: Bots taking advantage of proxy as a service
Negash et al. An overview of modern botnets
Srinivasan et al. Understanding cross-channel abuse with sms-spam support infrastructure attribution
Pihelgas Back-tracing and Anonymity in Cyberspace
Aravind et al. Tracing IP Addresses Behind Vpn/Proxy Servers
Sperotto et al. Distributed ddos defense: A collaborative approach at internet scale
Dai Nguyen et al. C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks
Wardman et al. A practical analysis of the rise in mobile phishing
Kropotov et al. The hacker infrastructure and underground hosting: Services used by criminals
Marchetti et al. Cyber attacks on financial critical infrastructures
Khan et al. A First Look at User-Installed Residential Proxies From a Network Operator’s Perspective