POSTER: How Distributed Are Today's DDoS Attacks?

被引:2
|
作者
Wang, An [1 ]
Chang, Wentao [1 ]
Mohaisen, Aziz [2 ]
Chen, Songqin [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
[2] VenSign Labs, Reston, VA USA
关键词
Botnet; DDoS attacks; attack characterization;
D O I
10.1145/2660267.2662382
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today botnets are responsible for most of the DDoS attacks on the Internet. Understanding the characteristics of such DDoS attacks is critical to develop effective DDoS mitigation schemes. In this poster. we present some preliminary findings, mainly concerning the distribution of the attackers, of today's DDoS attacks. Our investigation is based on 50,704 different Internet DDoS attacks collected within a seven-month period for activities across the globe. These attacks were launched by 674 botnet generations from 23 different bonet families with a total of 9026 victim IPs belonging to 1074 organizations that are collectively located in 186 countries. We find that different from the traditional widely distributed intuition, most of these DDoS attacks are not widely distributed as the attackers are mostly from the same region, i.e., highly regionalized. We also find that different botnet families have strong target preferences in the same area as well. These findings refresh our understanding on the modern DDoS attacks.
引用
收藏
页码:1511 / 1513
页数:3
相关论文
共 50 条
  • [31] SmartDefense: A distributed deep defense against DDoS attacks with edge computing
    Myneni, Sowmya
    Chowdhary, Ankur
    Huang, Dijiang
    Alshamrani, Adel
    COMPUTER NETWORKS, 2022, 209
  • [32] Review on Mitigation of Distributed Denial of Service (DDoS) Attacks in Cloud Computing
    Khadke, Ashwini
    Madankar, Mangala
    Motghare, Manish
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [33] THROTTLING DDoS ATTACKS
    Gujjunoori, Saraiah
    Syed, Taqi Ali
    Madhu, Babu J.
    Avinash, D.
    Mohandas, Radhesh
    Pais, Alwyn R.
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 121 - +
  • [34] DISTRIBUTED DENIAL OF SERVICE (DDOS) NETWORK ATTACKS: IMPACT ON THE VIRTUAL LEARNING ENVIRONMENT
    Atayero, A. A.
    Oshin, O. I.
    Oshin, B. O.
    Alatishe, A. S.
    ICERI2014: 7TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2014, : 2235 - 2240
  • [35] Protecting Web Applications from DDoS Attacks by an Active Distributed Defense System
    Xiang, Yang
    Zhou, Wanlei
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2006, 2 (01) : 37 - +
  • [36] A Distributed Collaborative Entrance Defense Framework Against DDoS Attacks on Satellite Internet
    Guo, Wei
    Xu, Jin
    Pei, Yukui
    Yin, Liuguo
    Jiang, Chunxiao
    Ge, Ning
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (17) : 15497 - 15510
  • [37] Stopping Amplified DNS DDoS Attacks Through Distributed Query Rate Sharing
    Verma, Saurabh
    Hamieh, Ali
    Huh, Jun Ho
    Holm, Henrik
    Rajagopalan, Siva Raj
    Korczynski, Maciej
    Fefferman, Nina
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 69 - 78
  • [38] Distributed-log-based IP traceback scheme to defeat DDoS attacks
    Jing, Yinan
    Li, Jingtao
    Wang, Xueping
    Xiao, Xiaochun
    Zhang, Gendu
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 25 - +
  • [39] On the effectiveness of rate-limiting methods to mitigate distributed DoS (DDoS) attacks
    Komatsu, Takanori
    Namatame, Akira
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (10) : 2665 - 2672
  • [40] Mass network flooding attacks (distributed denial of service - DDoS) surface in the wild
    Hancock, B
    COMPUTERS & SECURITY, 2000, 19 (01) : 6 - 7