3.8 Proceedings Paper

Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Information Systems

Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope

Philipp Richter et al.

IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE (2019)

Proceedings Paper Computer Science, Theory & Methods

Millions of Targets Under Attack: a Macroscopic Characterization of the DoS Ecosystem

Mattijs Jonker et al.

PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17) (2017)

Proceedings Paper Computer Science, Software Engineering

Linking Amplification DDoS Attacks to Booter Services

Johannes Krupp et al.

RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017) (2017)

Proceedings Paper Computer Science, Information Systems

Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter

Norbert Blenn et al.

PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017) (2017)

Article Criminology & Penology

Exploring the Provision of Online Booter Services

Alice Hutchings et al.

DEVIANT BEHAVIOR (2016)

Proceedings Paper Computer Science, Information Systems

Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks

Johannes Krupp et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Characterizing Optimal DNS Amplification Attacks and Effective Mitigation

Douglas C. MacFarland et al.

PASSIVE AND ACTIVE MEASUREMENT (PAM 2015) (2015)

Proceedings Paper Computer Science, Information Systems

A Search Engine Backed by Internet-Wide Scanning

Zakir Durumeric et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Proceedings Paper Computer Science, Software Engineering

Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks

Jakub Czyz et al.

PROCEEDINGS OF THE 2014 ACM INTERNET MEASUREMENT CONFERENCE (IMC'14) (2014)

Article Computer Science, Information Systems

An analysis of using reflectors for distributed denial-of-service attacks

V Paxson

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2001)