3.8 Proceedings Paper

Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3460120.3484747

关键词

Cyber Threat Intelligence; Internet Measurements; DDoS

向作者/读者索取更多资源

Amplification attacks involve sending a massive amount of unwanted traffic to a victim through open, unsecured services, requiring various activities such as the development of attack tools, selecting open services, and testing them. By analyzing adversarial techniques based on deployed honeypots in multiple clouds, researchers found that adversaries actively test the plausibility, packet loss, and amplification benefits of servers, showing differences in how they operate even in commonplace attacks.
Amplification attacks generate an enormous flood of unwanted traffic towards a victim and are generated with the help of open, unsecured services, to which an adversary sends spoofed service requests that trigger large answer volumes to a victim. However, the actual execution of the packet flood is only one of the activities necessary for a successful attack. Adversaries need, for example, to develop attack tools, select open services to abuse, test them, and adapt the attacks if necessary, each of which can be implemented in myriad ways. Thus, to understand the entire ecosystem and how adversaries work, we need to look at the entire chain of activities. This paper analyzes adversarial techniques, tactics, and procedures (TTPs) based on 549 honeypots deployed in 5 clouds that were rallied to participate in 13,479 attacks. Using a traffic shaping approach to prevent meaningful participation in DDoS activities while allowing short bursts of adversarial testing, we find that adversaries actively test for plausibility, packet loss, and amplification benefits of these servers, and show evidence of a memory of previously exploited servers among attackers. In practice, we demonstrate that even for commonplace amplification attacks, adversaries exhibit differences in how they work.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据