Denial of Service Attack
Denial of Service Attack
1
2 3 ATTACK TECHNIQUES
This type of attack involves massive network layer DDoS service attack to include:[12]
attacks through to focused application layer (HTTP)
oods, followed by repeated (at varying intervals) SQLi unusually slow network performance (opening les
and XSS attacks. Typically, the perpetrators can simul- or accessing web sites)
taneously use from 2 to 5 attack vectors involving up to
several tens of millions of requests per second, often ac- unavailability of a particular web site
companied by large SYN oods that can not only attack
the victim but also any service provider implementing any inability to access any web site
sort of managed DDoS mitigation capability. These at-
dramatic increase in the number of spam emails re-
tacks can persist for several weeks- the longest continuous
ceived (this type of DoS attack is considered an e-
period noted so far lasted 38 days. This APDoS attack in-
mail bomb).
volved approximately 50+ petabits (100,000+ terabits) of
malicious trac.
Additional symptoms may include:
Attackers in this scenario may (or often will) tactically
switch between several targets to create a diversion to
evade defensive DDoS countermeasures but all the while disconnection of a wireless or wired internet con-
eventually concentrating the main thrust of the attack nection
onto a single victim. In this scenario, threat actors with
long-term denial of access to the web or any internet
continuous access to several very powerful network re-
services.
sources are capable of sustaining a prolonged campaign
generating enormous levels of un-amplied DDoS trac.
If the attack is conducted on a suciently large scale, en-
APDoS attacks are characterised by: tire geographical regions of Internet connectivity can be
compromised without the attackers knowledge or intent
advanced reconnaissance (pre-attack OSINT and
by incorrectly congured or imsy network infrastructure
extensive decoyed scanning crafted to evade detec-
equipment.
tion over long periods)
tactical execution (attack with a primary and sec-
ondary victims but focus is on primary) 3 Attack techniques
explicit motivation (a calculated end game/goal tar-
get) A wide array of programs are used to launch DoS-attacks.
large computing capacity (access to substantial com-
puter power and network bandwidth resources) 3.1 Attack tools
simultaneous multi-threaded OSI layer attacks (so-
phisticated tools operating at layers 3 through 7) In cases such as MyDoom the tools are embedded in mal-
ware, and launch their attacks without the knowledge of
persistence over extended periods (utilising all the the system owner. Stacheldraht is a classic example of
above into a concerted, well managed attack across a DDoS tool. It utilizes a layered structure where the
a range of targets[10] ). attacker uses a client program to connect to handlers,
which are compromised systems that issue commands to
1.3 Denial-of-service as a service the zombie agents, which in turn facilitate the DDoS at-
tack. Agents are compromised via the handlers by the
Some vendors provide so-called booter or stresser attacker, using automated routines to exploit vulnerabili-
services, which have simple web-based front ends, and ties in programs that accept remote connections running
accept payment over the web. Marketed and promoted on the targeted remote hosts. [13]
Each handler can control
as stress-testing tools, they can be used to perform unau- up to a thousand agents.
thorized denial-of-service attacks, and allow technically In other cases a machine may become part of a DDoS at-
unsophisticated attackers access to sophisticated attack tack with the owners consent, for example, in Operation
tools without the need for the attacker to understand their Payback, organized by the group Anonymous. The LOIC
use.[11] has typically been used in this way. Along with HOIC a
wide variety of DDoS tools are available today, including
paid and free versions, with dierent features available.
2 Symptoms There is an underground market for these in hacker re-
lated forums and IRC channels.
The United States Computer Emergency Readiness Team UKs GCHQ has tools built for DDoS, named PREDA-
(US-CERT) has identied symptoms of a denial-of- TORS FACE and ROLLING THUNDER.[14]
3.4 Denial-of-service Level II 3
Various DoS-causing exploits such as buer overow can The goal of DoS L2 (possibly DDoS) attack is to cause a
cause server-running software to get confused and ll the launching of a defense mechanism which blocks the net-
disk space or consume all available memory or CPU time. work segment from which the attack originated. In case
of distributed attack or IP header modication (that de-
Other kinds of DoS rely primarily on brute force, ood-
pends on the kind of security behavior) it will fully block
ing the target with an overwhelming ux of packets, over-
the attacked network from the Internet, but without sys-
saturating its connection bandwidth or depleting the tar-
tem crash.
gets system resources. Bandwidth-saturating oods rely
on the attacker having higher bandwidth available than
the victim; a common way of achieving this today is via 3.5 Distributed DoS attack
distributed denial-of-service, employing a botnet. An-
other target of DDoS attacks may be to produce added A distributed denial-of-service (DDoS) attack occurs
costs for the application operator, when the latter uses re- when multiple systems ood the bandwidth or resources
sources based on Cloud Computing. In this case normally of a targeted system, usually one or more web servers.[6]
application used resources are tied to a needed Quality of Such an attack is often the result of multiple compro-
Service level (e.g. responses should be less than 200 ms) mised systems (for example, a botnet) ooding the tar-
and this rule is usually linked to automated software (e.g. geted system with trac. A botnet is a network of zom-
Amazon CloudWatch[15] ) to raise more virtual resources bie computers programmed to receive commands without
from the provider in order to meet the dened QoS lev- the owners knowledge.[19] When a server is overloaded
els for the increased requests.The main incentive behind with connections, new connections can no longer be ac-
such attacks may be to drive the application owner to raise cepted. The major advantages to an attacker of using a
the elasticity levels in order to handle the increased ap- distributed denial-of-service attack are that multiple ma-
plication trac, in order to cause nancial losses or force chines can generate more attack trac than one machine,
them to become less competitive. Other oods may use multiple attack machines are harder to turn o than one
specic packet types or connection requests to saturate - attack machine, and that the behavior of each attack ma-
nite resources by, for example, occupying the maximum chine can be stealthier, making it harder to track and shut
number of open connections or lling the victims disk down. These attacker advantages cause challenges for de-
space with logs. fense mechanisms. For example, merely purchasing more
A banana attack is another particular type of DoS. It in- incoming bandwidth than the current volume of the at-
volves redirecting outgoing messages from the client back tack might not help, because the attacker might be able
onto the client, preventing outside access, as well as ood- to simply add more attack machines. This, after all, will
ing the client with the sent packets. A LAND attack is of end up completely crashing a website for periods of time.
this type. Malware can carry DDoS attack mechanisms; one of the
An attacker with shell-level access to a victims computer better-known examples of this was MyDoom. Its DoS
may slow it until it is unusable or crash it by using a fork mechanism was triggered on a specic date and time.
bomb. This type of DDoS involved hardcoding the target IP ad-
dress prior to release of the malware and no further inter-
A kind of application-level DoS attack is XDoS (or XML action was necessary to launch the attack.
DoS) which can be controlled by modern web application
rewalls (WAFs). A system may also be compromised with a trojan, allow-
ing the attacker to download a zombie agent, or the trojan
may contain one. Attackers can also break into systems
using automated tools that exploit aws in programs that
3.3 Degradation-of-service attacks listen for connections from remote hosts. This scenario
primarily concerns systems acting as servers on the web.
Pulsing zombies are compromised computers that are Stacheldraht is a classic example of a DDoS tool. It uti-
directed to launch intermittent and short-lived oodings lizes a layered structure where the attacker uses a client
of victim websites with the intent of merely slowing it program to connect to handlers, which are compromised
rather than crashing it. This type of attack, referred to as systems that issue commands to the zombie agents, which
degradation-of-service rather than denial-of-service, in turn facilitate the DDoS attack. Agents are compro-
can be more dicult to detect than regular zombie inva- mised via the handlers by the attacker, using automated
sions and can disrupt and hamper connection to websites routines to exploit vulnerabilities in programs that accept
for prolonged periods of time, potentially causing more remote connections running on the targeted remote hosts.
disruption than concentrated oods.[16][17] Exposure of Each handler can control up to a thousand agents.[13] In
degradation-of-service attacks is complicated further by some cases a machine may become part of a DDoS attack
the matter of discerning whether the server is really being with the owners consent, for example, in Operation Pay-
attacked or under normal trac loads.[18] back, organized by the group Anonymous. These attacks
4 3 ATTACK TECHNIQUES
can use dierent types of internet packets such as: TCP, 3.7 HTTP POST DoS attack
UDP, ICMP etc.
These collections of systems compromisers are known as First discovered in 2009, the HTTP POST attack sends
botnets / rootservers. DDoS tools like Stacheldraht still a complete, legitimate HTTP POST header, which in-
use classic DoS attack methods centered on IP spoof- cludes a 'Content-Length' eld to specify the size of the
ing and amplication like smurf attacks and fraggle at- message body to follow. However, the attacker then pro-
tacks (these are also known as bandwidth consumption ceeds to send the actual message body at an extremely
attacks). SYN oods (also known as resource starva- slow rate (e.g. 1 byte/110 seconds). Due to the entire
tion attacks) may also be used. Newer tools can use message being correct and complete, the target server will
DNS servers for DoS purposes. Unlike MyDooms DDoS attempt to obey the 'Content-Length' eld in the header,
mechanism, botnets can be turned against any IP ad- and wait for the entire body of the message to be trans-
dress. Script kiddies use them to deny the availability mitted, which can take a very long time. The attacker
of well known websites to legitimate users.[20] More so- establishes hundreds or even thousands of such connec-
phisticated attackers use DDoS tools for the purposes of tions, until all resources for incoming connections on the
extortion even against their business rivals.[21] server (the victim) are used up, hence making any fur-
ther (including legitimate) connections impossible until
Simple attacks such as SYN oods may appear with a all data has been sent. It is notable that unlike many other
wide range of source IP addresses, giving the appearance (D)DoS attacks, which try to subdue the server by over-
of a well distributed DoS. These ood attacks do not re- loading its network or CPU, a HTTP POST attack tar-
quire completion of the TCP three way handshake and at- gets the logical resources of the victim, which means the
tempt to exhaust the destination SYN queue or the server victim would still have enough network bandwidth and
bandwidth. Because the source IP addresses can be triv- processing power to operate.[27] Further combined with
ially spoofed, an attack could come from a limited set of the fact that Apache will, by default, accept requests up
sources, or may even originate from a single host. Stack to 2GB in size, this attack can be particularly powerful.
enhancements such as syn cookies may be eective mit- HTTP POST attacks are dicult to dierentiate from
igation against SYN queue ooding, however complete legitimate connections, and are therefore able to bypass
bandwidth exhaustion may require involvement. some protection systems. OWASP, an open source web
If an attacker mounts an attack from a single host it would application security project, has released a testing tool to
be classied as a DoS attack. In fact, any attack against test the security of servers against this type of attacks.
availability would be classed as a denial-of-service attack.
On the other hand, if an attacker uses many systems to
simultaneously launch attacks against a remote host, this
would be classied as a DDoS attack. 3.8 Internet Control Message Protocol
(ICMP) ood
It has been reported that there are new attacks from
internet of things which have been involved in denial of
service attacks. [22] In one noted attack that was made A smurf attack relies on miscongured network devices
peaked at around 20,000 requests per second which came that allow packets to be sent to all computer hosts on a
from around 900 CCTV cameras. [23] particular network via the broadcast address of the net-
work, rather than a specic machine. The attacker will
UKs GCHQ has tools built for DDoS, named PREDA- send large numbers of IP packets with the source address
TORS FACE and ROLLING THUNDER.[14] faked to appear to be the address of the victim. The net-
See also: DDoS mitigation works bandwidth is quickly used up, preventing legiti-
mate packets from getting through to their destination.[28]
Ping ood is based on sending the victim an overwhelm-
ing number of ping packets, usually using the ping com-
mand from Unix-like hosts (the -t ag on Windows sys-
tems is much less capable of overwhelming a target, also
3.6 DDoS extortion the -l (size) ag does not allow sent packet size greater
than 65500 in Windows). It is very simple to launch, the
primary requirement being access to greater bandwidth
In 2015, DDoS botnets such as DD4BC grew in promi- than the victim.
nence, taking aim at nancial institutions.[24] Cyber-
extortionists typically begin with a low-level attack and a Ping of death is based on sending the victim a malformed
warning that a larger attack will be carried out if a ransom ping packet, which will lead to a system crash on a vul-
is not paid in Bitcoin.[25] Security experts recommend tar- nerable system.
geted websites to not pay the ransom. The attackers tend The BlackNurse attack is an example of an attack taking
to get into an extended extortion scheme once they rec- advantage of the required Destination Port Unreachable
ognize that the target is ready to pay.[26] ICMP packets.
3.12 Reected / spoofed attack 5
3.12.1 Amplication
Attackers have found a way to exploit a number of bugs in
peer-to-peer servers to initiate DDoS attacks. The most
Amplication attacks are used to magnify the bandwidth
aggressive of these peer-to-peer-DDoS attacks exploits
that is sent to a victim. This is typically done through pub-
DC++. With peer-to-peer there is no botnet and the at-
licly accessible DNS servers that are used to cause con-
tacker does not have to communicate with the clients it
gestion on the target system using DNS response trac.
subverts. Instead, the attacker acts as a puppet master,
Many services can be exploited to act as reectors, some
instructing clients of large peer-to-peer le sharing hubs
harder to block than others.[36] US-CERT have observed
to disconnect from their peer-to-peer network and to con-
that dierent services implies in dierent amplication
nect to the victims website instead.[29][30][31]
factors, as you can see below:[37]
DNS amplication attacks involve a new mechanism that
3.11 Permanent denial-of-service attacks increased the amplication eect, using a much larger list
of DNS servers than seen earlier. The process typically
Permanent denial-of-service (PDoS), also known loosely involves an attacker sending a DNS name look up request
as phlashing,[32] is an attack that damages a system so to a public DNS server, spoong the source IP address
badly that it requires replacement or reinstallation of of the targeted victim. The attacker tries to request as
hardware.[33] Unlike the distributed denial-of-service at- much zone information as possible, thus amplifying the
tack, a PDoS attack exploits security aws which allow DNS record response that is sent to the targeted victim.
remote administration on the management interfaces of Since the size of the request is signicantly smaller than
the victims hardware, such as routers, printers, or other the response, the attacker is easily able to increase the
networking hardware. The attacker uses these vulnera- amount of trac directed at the target. [40][41] SNMP and
bilities to replace a devices rmware with a modied, NTP can also be exploited as reector in an amplication
corrupt, or defective rmware imagea process which attack.
when done legitimately is known as ashing. This there- An example of an amplied DDoS attack through NTP is
fore "bricks" the device, rendering it unusable for its orig- through a command called monlist, which sends the de-
inal purpose until it can be repaired or replaced. tails of the last 600 people who have requested the time
The PDoS is a pure hardware targeted attack which can from that computer back to the requester. A small request
be much faster and requires fewer resources than using to this time server can be sent using a spoofed source IP
a botnet or a root/vserver in a DDoS attack. Because of address of some victim, which results in 556.9 times the
these features, and the potential and high probability of amount of data that was requested back to the victim.
security exploits on Network Enabled Embedded Devices This becomes amplied when using botnets that all send
(NEEDs), this technique has come to the attention of nu- requests with the same spoofed IP source, which will send
merous hacking communities. a massive amount of data back to the victim.
PhlashDance is a tool created by Rich Smith (an It is very dicult to defend against these types of at-
employee of Hewlett-Packards Systems Security Lab) tacks because the response data is coming from legitimate
used to detect and demonstrate PDoS vulnerabilities at servers. These attack requests are also sent through UDP,
6 3 ATTACK TECHNIQUES
which does not require a connection to the server. This Each of these packets are handled like a connection re-
means that the source IP is not veried when a request quest, causing the server to spawn a half-open connec-
is received by the server. In order to bring awareness of tion, by sending back a TCP/SYN-ACK packet (Ac-
these vulnerabilities, campaigns have been started that are knowledge), and waiting for a packet in response from the
dedicated to nding amplication vectors which has led sender address (response to the ACK Packet). However,
to people xing their resolvers or having the resolvers shut because the sender address is forged, the response never
down completely. comes. These half-open connections saturate the number
of available connections the server can make, keeping it
from responding to legitimate requests until after the at-
3.13 R-U-Dead-Yet? (RUDY) tack ends.[45]
thousands of automated calls. In some cases, dis- be based on an application layer analysis, to indicate
played caller ID is spoofed to impersonate police or whether an incoming trac bulk is legitimate or not and
law enforcement agencies.[50] thus enable the triggering of elasticity decisions with-
out the economical implications of a DDoS attack.[52]
A scammer contacts consumers with a bogus debt These approaches mainly rely on an identied path of
collection demand and threatens to send police; value inside the application and monitor the macroscopic
when the victim balks, the scammer oods local po- progress of the requests in this path, towards the nal gen-
lice numbers with calls on which caller ID is spoofed eration of prot, through markers denoted as Key Com-
to display the victims number. Police soon arrive at pletion Indicators.[53]
the victims residence attempting to nd the origin
of the calls.
4.3 Blackholing and sinkholing
Telephony denial-of-service can exist even without
Internet telephony. In the 2002 New Hampshire Senate With blackhole routing, all the trac to the attacked DNS
election phone jamming scandal, telemarketers were used or IP address is sent to a black hole (null interface or
to ood political opponents with spurious calls to jam a non-existent server). To be more ecient and avoid
phone banks on election day. Widespread publication of aecting network connectivity, it can be managed by the
a number can also ood it with enough calls to render it ISP.[54]
unusable, as happened with multiple +1-area code867- A DNS sinkhole routes trac to a valid IP address which
5309 subscribers inundated by hundreds of misdialed analyzes trac and rejects bad packets. Sinkholing is not
calls daily in response to the song 867-5309/Jenny. ecient for most severe attacks.
TDoS diers from other telephone harassment (such as
prank calls and obscene phone calls) by the number of
calls originated; by occupying lines continuously with 4.4 IPS based prevention
repeated automated calls, the victim is prevented from
making or receiving both routine and emergency tele- Intrusion prevention systems (IPS) are eective if the at-
phone calls. tacks have signatures associated with them. However, the
Related exploits include SMS ooding attacks and black trend among the attacks is to have legitimate content but
fax or fax loop transmission. bad intent. Intrusion-prevention systems which work on
content recognition cannot block behavior-based DoS at-
tacks.
4 Defense techniques An ASIC based IPS may detect and block denial-of-
service attacks because they have the processing power
and the granularity to analyze the attacks and act like a
Defensive responses to denial-of-service attacks typically
circuit breaker in an automated way.
involve the use of a combination of attack detection, traf-
c classication and response tools, aiming to block traf- A rate-based IPS (RBIPS) must analyze trac granularly
c that they identify as illegitimate and allow trac that and continuously monitor the trac pattern and deter-
they identify as legitimate.[51] A list of prevention and re- mine if there is trac anomaly. It must let the legitimate
sponse tools is provided below: trac ow while blocking the DoS attack trac.[55]
Application front-end hardware is intelligent hardware More focused on the problem than IPS, a DoS defense
placed on the network before trac reaches the servers. system (DDS) can block connection-based DoS attacks
It can be used on networks in conjunction with routers and those with legitimate content but bad intent. A DDS
and switches. Application front end hardware analyzes can also address both protocol attacks (such as teardrop
data packets as they enter the system, and then identies and ping of death) and rate-based attacks (such as ICMP
them as priority, regular, or dangerous. There are more oods and SYN oods).
than 25 bandwidth management vendors.
4.6 Firewalls
4.2 Application level Key Completion Indi-
cators In the case of a simple attack, a rewall could have a sim-
ple rule added to deny all incoming trac from the at-
In order to meet the case of application level DDoS at- tackers, based on protocols, ports or the originating IP
tacks against cloud-based applications, approaches may addresses.
8 5 UNINTENTIONAL DENIAL-OF-SERVICE
More complex attacks will however be hard to block with Arbor Networks[62]
simple rules: for example, if there is an ongoing attack
on port 80 (web service), it is not possible to drop all in- AT&T[63]
coming trac on this port because doing so will prevent
the server from serving legitimate trac.[56] Additionally, F5 Networks[64]
rewalls may be too deep in the network hierarchy, with
routers being adversely aected before the trac gets to Incapsula[65]
the rewall.
Neustar Inc[66]
Akamai Technologies[67]
4.7 Routers
Tata Communications[68]
Similar to switches, routers have some rate-limiting and
ACL capability. They, too, are manually set. Most Verisign[69]
routers can be easily overwhelmed under a DoS attack.
Cisco IOS has optional features that can reduce the im- Verizon[70][71]
pact of ooding.[57]
Legal action has been taken in at least one such case. In the US, denial-of-service attacks may be con-
In 2006, Universal Tube & Rollform Equipment Cor- sidered a federal crime under the Computer Fraud
poration sued YouTube: massive numbers of would-be and Abuse Act with penalties that include years of
youtube.com users accidentally typed the tube companys imprisonment.[77] The Computer Crime and Intel-
URL, utube.com. As a result, the tube company ended lectual Property Section of the US Department of
up having to spend large amounts of money on upgrading Justice handles cases of (D)DoS.
their bandwidth.[74] The company appears to have taken
advantage of the situation, with utube.com now contain- In European countries, committing criminal denial-
ing ads for advertisement revenue. of-service attacks may, as a minimum, lead to
arrest.[78] The United Kingdom is unusual in that it
In March 2014, after Malaysia Airlines Flight 370 went specically outlawed denial-of-service attacks and
missing, DigitalGlobe launched a crowdsourcing service set a maximum penalty of 10 years in prison with the
on which users could help search for the missing jet in Police and Justice Act 2006, which amended Sec-
satellite images. The response overwhelmed the com- tion 3 of the Computer Misuse Act 1990.[79]
panys servers.[75]
An unintentional denial-of-service may also result from On January 7, 2013, Anonymous posted a petition on the
a prescheduled event created by the website itself, as was whitehouse.gov site asking that DDoS be recognized as
the case of the Census in Australia in 2016. This could be a legal form of protest similar to the Occupy protests,
caused when a server provides some service at a specic the claim being that the similarity in purpose of both are
time. This might be a university website setting the grades same.[80][81]
to be available where it will result in many more login
requests at that time than any other.
8 See also
6 Side eects of attacks Application layer DDoS attack
BASHLITE
6.1 Backscatter
Billion laughs
See also: Backscatter (email) and Internet background Botnet
noise
Command and control (malware)
In computer network security, backscatter is a side-eect DDoS mitigation
of a spoofed denial-of-service attack. In this kind of at-
tack, the attacker spoofs (or forges) the source address in Dendroid (malware)
IP packets sent to the victim. In general, the victim ma-
Fork bomb
chine cannot distinguish between the spoofed packets and
legitimate packets, so the victim responds to the spoofed High Orbit Ion Cannon (HOIC)
packets as it normally would. These response packets are
known as backscatter.[76] Hit-and-run DDoS
If the attacker is spoong source addresses randomly, the Industrial espionage
backscatter response packets from the victim will be sent
back to random destinations. This eect can be used by Innite loop
network telescopes as indirect evidence of such attacks.
Intrusion detection system
The term backscatter analysis refers to observing
backscatter packets arriving at a statistically signicant Low Orbit Ion Cannon (LOIC)
portion of the IP address space to determine characteris- Network intrusion detection system
tics of DoS attacks and victims.
October 2016 Dyn cyberattack
Project Shield
7 Legality
ReDoS
See also: Computer crime SlowDroid
Slowloris (computer security)
Many jurisdictions have laws under which denial-of-
service attacks are illegal. UDP Unicorn
10 9 REFERENCES
Virtual sit-in [13] Dittrich, David (December 31, 1999). The stachel-
draht distributed denial of service attack tool. Univer-
Warzapping sity of Washington. Retrieved 2013-12-11.
9 References [17] Schwabach, Aaron (2006). Internet and the Law. ABC-
CLIO. p. 325. ISBN 1-85109-731-7.
[1] denial of service attack. Retrieved 26 May 2016. [18] Lu, Xicheng; Wei Zhao (2005). Networking and Mobile
Computing. Birkhuser. p. 424. ISBN 3-540-28102-9.
[2] Prince, Matthew (25 April 2016). Empty DDoS Threats:
Meet the Armada Collective. CloudFlare. Retrieved 18 [19] Has Your Website Been Bitten By a Zombie?". Cloud-
May 2016. bric. 3 August 2015. Retrieved 15 September 2015.
[3] Brand.com President Mike Zammuto Reveals Blackmail
[20] Boyle, Phillip (2000). SANS Institute Intrusion De-
Attempt. 5 March 2014. Archived from the original on
tection FAQ: Distributed Denial of Service Attack Tools:
11 March 2014.
n/a. SANS Institute. Retrieved 2008-05-02.
[4] Brand.coms Mike Zammuto Discusses Meetup.com Ex-
[21] Leyden, John (2004-09-23). US credit card rm ghts
tortion. 5 March 2014. Archived from the original on 13
DDoS attack. The Register. Retrieved 2011-12-02.
May 2014.
[5] The Philosophy of Anonymous. Radicalphiloso- [22] Swati Khandelwal (23 October 2015). Hacking CCTV
phy.com. 2010-12-17. Retrieved 2013-09-10. Cameras to Launch DDoS Attacks. The Hacker News.
[9] Khandelwal, Swati (26 September 2016). Worlds largest [27] OWASP Plan - Strawman - Layer_7_DDOS.pdf
1 Tbps DDoS Attack launched from 152,000 hacked (PDF). Open Web Application Security Project. 18 March
Smart Devices. The Hacker News. Archived from the 2014. Retrieved 18 March 2014.
original on 30 September 2016.
[28] Types of DDoS Attacks. Distributed Denial of Service
[10] Gold, Steve (21 August 2014). Video games company Attacks(DDoS) Resources, Pervasive Technology Labs at
hit by 38-day DDoS attack. SC Magazine UK. Retrieved Indiana University. Advanced Networking Management
4 February 2016. Lab (ANML). December 3, 2009. Archived from the
original on 2010-09-14. Retrieved December 11, 2013.
[11] Krebs, Brian (August 15, 2015). Stress-Testing the
Booter Services, Financially. Krebs on Security. Re- [29] Paul Sop (May 2007). Prolexic Distributed Denial of
trieved 2016-09-09. Service Attack Alert. Prolexic Technologies Inc. Prolexic
Technologies Inc. Archived from the original on 2007-08-
[12] McDowell, Mindi (November 4, 2009). Cyber Secu- 03. Retrieved 2007-08-22.
rity Tip ST04-015 - Understanding Denial-of-Service At-
tacks. United States Computer Emergency Readiness [30] Robert Lemos (May 2007). Peer-to-peer networks co-
Team. Archived from the original on 2013-11-04. Re- opted for DOS attacks. SecurityFocus. Retrieved 2007-
trieved December 11, 2013. 08-22.
11
[31] Fredrik Ullner (May 2007). Denying distributed at- [49] FBI Phony Phone Calls Distract Consumers from
tacks. DC++: Just These Guys, Ya Know?. Retrieved Genuine Theft. FBI.gov. 2010-05-11. Retrieved 2013-
2007-08-22. 09-10.
[32] Leyden, John (2008-05-21). Phlashing attack thrashes [50] Internet Crime Complaint Centers (IC3) Scam Alerts
embedded systems. The Register. Retrieved 2009-03-07. January 7, 2013. IC3.gov. 2013-01-07. Retrieved 2013-
09-10.
[33] Jackson Higgins, Kelly (May 19, 2008). Permanent
Denial-of-Service Attack Sabotages Hardware. Dark [51] Loukas, G.; Oke, G. (September 2010) [August 2009].
Reading. Archived from the original on December 8, Protection Against Denial of Service Attacks: A
2008. Survey (PDF). Comput. J. 53 (7): 10201037.
doi:10.1093/comjnl/bxp078.
[34] EUSecWest Applied Security Conference: London,
U.K.. EUSecWest. 2008. Archived from the original [52] Alqahtani, S.; Gamble, R. F. (1 January 2015). DDoS
on 2009-02-01. Attacks in Service Clouds. 2015 48th Hawaii Inter-
national Conference on System Sciences (HICSS): 5331
[35] Rossow, Christian (February 2014). Amplication Hell: 5340. doi:10.1109/HICSS.2015.627.
Revisiting Network Protocols for DDoS Abuse (PDF).
Internet Society. Retrieved 4 February 2016. [53] Kousiouris, George (2014). KEY COMPLETION
INDICATORS:minimizing the eect of DoS attacks on
[36] Paxson, Vern (2001). An Analysis of Using Reectors elastic Cloud-based applications based on application-
for Distributed Denial-of-Service Attacks. ICIR.org. level markov chain checkpoints. CLOSER Conference.
Retrieved 2015-05-24.
[37] Alert (TA14-017A) UDP-based Amplication Attacks.
US-CERT. July 8, 2014. Retrieved 2014-07-08. [54] Patrikakis, C.; Masikos, M.; Zouraraki, O. (December
2004). Distributed Denial of Service Attacks. The In-
[38] van Rijswijk-Deij, Roland (2014). DNSSEC and its po- ternet Protocol Journal. 7 (4): 1335.
tential for DDoS attacks - a comprehensive measurement
study. ACM Press. [55] Abante, Carl (March 2, 2013). Relationship between
Firewalls and Protection against DDoS. Ecommerce Wis-
[39] Adamsky, Florian (2015). P2P File-Sharing in Hell: Ex- dom. Retrieved 2013-05-24.
ploiting BitTorrent Vulnerabilities to Launch Distributed
Reective DoS Attacks. [56] Froutan, Paul (June 24, 2004). How to defend against
DDoS attacks. Computerworld. Retrieved May 15,
[40] Vaughn, Randal; Evron, Gadi (2006). DNS Amplica- 2010.
tion Attacks (PDF). ISOTF. Archived from the original
(PDF) on 2010-12-14. [57] Suzen, Mehmet. Some IoS tips for Internet Service
(Providers)" (PDF). Archived from the original (PDF) on
[41] Alert (TA13-088A) DNS Amplication Attacks. US- 2008-09-10.
CERT. July 8, 2013. Retrieved 2013-07-17.
[58] DDoS Mitigation via Regional Cleaning Centers (Jan
[42] Yu Chen; Kai Hwang; Yu-Kwong Kwok (2005). 2004)" (PDF). SprintLabs.com. Sprint ATL Research.
Filtering of shrew DDoS attacks in frequency do- Archived from the original (PDF) on 2008-09-21. Re-
main. The IEEE Conference on Local Computer trieved 2011-12-02.
Networks 30th Anniversary (LCN'05)l. pp. 8 pp.
[59] Gallagher, Sean. Biggest DDoS ever aimed at Cloud-
doi:10.1109/LCN.2005.70. ISBN 0-7695-2421-4.
ares content delivery network. Ars Technica. Retrieved
[43] Ben-Porat, U.; Bremler-Barr, A.; Levy, H. (2013-05-01). 18 May 2016.
Vulnerability of Network Mechanisms to Sophisticated [60] Level 3 DDoS Mitigation. level3.com. Retrieved 9 May
DDoS Attacks. IEEE Transactions on Computers. 62 (5): 2016.
10311043. doi:10.1109/TC.2012.49. ISSN 0018-9340.
[61] Defensepipe. radware.com. Retrieved November 2015.
[44] orbitalsatelite. Slow HTTP Test. SourceForge. Check date values in: |access-date= (help)
[45] RFC 4987 TCP SYN Flooding Attacks and Common [62] Clean Pipes DDoS Protection and Mitigation from Arbor
Mitigations. Tools.ietf.org. August 2007. Retrieved Networks & Cisco. ArborNetworks.com. 8 August 2013.
2011-12-02.
[63] AT&T Internet Protect Distributed Denial of Service
[46] CERT Advisory CA-1997-28 IP Denial-of-Service At- Defense (PDF). ATT.com (Product brief). 16 October
tacks. CERT. 1998. Retrieved July 18, 2014. 2012.
[47] Windows 7, Vista exposed to 'teardrop attack'". ZDNet. [64] Silverline DDoS Protection service. f5.com. Retrieved
September 8, 2009. Retrieved 2013-12-11. March 2015. Check date values in: |access-date= (help)
[48] Microsoft Security Advisory (975497): Vulnerabilities [65] Infrastructure DDos Protection. incapsula.com. Re-
in SMB Could Allow Remote Code Execution. Mi- trieved June 2015. Check date values in: |access-date=
crosoft.com. September 8, 2009. Retrieved 2011-12-02. (help)
12 11 EXTERNAL LINKS
[66] DDoS Protection. Neustar.biz. Retrieved November The Berkman Center for Internet & Society at Har-
2014. Check date values in: |access-date= (help) vard University. Archived from the original (PDF)
on 2011-03-02. Retrieved 2011-03-02.
[67] Lunden, Ingrid (December 2, 2013). Akamai Buys
DDoS Prevention Specialist Prolexic For $370M DDOS Public Media Reports. Harvard. Archived
To Ramp Up Security Oerings For Enterprises. from the original on 2011-03-02.
TechCrunch. Retrieved September 23, 2014.
[77] United States Code: Title 18,1030. Fraud and related ac-
tivity in connection with computers | Government Printing
Oce. www.gpo.gov. 2002-10-25. Retrieved 2014-01-
15.
10 Further reading
Ethan Zuckerman; Hal Roberts; Ryan McGrady;
Jillian York; John Palfrey (December 2011).
Distributed Denial of Service Attacks Against In-
dependent Media and Human Rights Sites (PDF).
13
bourneStar, Satellizer, Permalinks, Joefromrandb, Cogware, Stultiwikia, Lawandtech, Lasoraf, Sunndil, Tejasrnbr, Jormund, 123Hedge-
hog456, O.Koslowski, Vlhsrp, Popo41~enwiki, Widr, Soulcedric, Helpful Pixie Bot, Strike Eagle, BG19bot, Murler, Rpk74 lb, Tragic8,
Vagobot, Fahmedch, Streakydjl, Juro2351, Mleoking, MadHaTTer666, Mfordtln, Lloydus98, Adsf1234, MusikAnimal, Stogers, Kevo1cat,
Mark Arsten, Op47, Rm1271, GGShinobi, Eduart.steiner, Writ Keeper, Jarrodmaddy, Junganghansik, Gtaguy235, Minhal Mehdi, World-
newsinformant, Comfr, Skunk44, BattyBot, Abgelcartel, David.moreno72, AllenZh, RichardMills65, Mdann52, Cathairawr, Tonyxc600,
Cyberbot II, Vinsanity123, Run4health, Chengshuotian, Eb1511, Dwnd4, Superkc, Team Blitz, Iciciliser, Kikue26, Dexbot, K7L, Soledad-
Kabocha, 331dot, TonyJunak, Broadcasterxp, Lugia2453, Spicyitalianmeatball, UNOwenNYC, Ascom99, Jmoss57, Leemon2010, Me,
Myself, and I are Here, Palmbeachguy, Rogr101, JoshuaHall155065, Sid Shadeslayer, Epicgenius, Ashikali1607, Renoldsmartin, Ex-
tremeRobot, HMGamerr, FrigidNinja, Melonkelon, Mbmexpress, JamesMoose, Tentinator, Sngs87, Marchino61, Webhostingtips, John-
hax, Ogh4x, Nodove, DavidLeighEllis, Dwgould, NiuWang, Reacher1989, Ginsuloft, ArmitageAmy, Henrychan123, Jianhui67, Fock-
eWulf FW 190, UY Scuti, Quitesavvy, YellowLawnChair, Akashksunny13, Meteor sandwich yum, Jeremyb-phone, PJone, Dodi 8238, Pvp-
masters, XxWoLfxX115, JNKL, Lordangel101, Kazkade, Monkbot, Noahp15, Lucyloo10, Vieque, Jakupian, Jacobdunn82, Web20DOS,
Muhammadabubakar92, Cph12345, 365adventure, Frogteam, Orthogonal1, MRD2014, Bammie73, BlackCat1978, ApolloLV, Jjsantanna,
Thetechgirl, Sam-the-droid, Cirow, KH-1, Tommate789, ChamithN, Koen2014 7, Matiia, V1n1 paresh, HoustonMade, Flated, Probin-
crux, ThatOneGuyGaming, Lizard Squadrant, JohnZLegand, Delcooper11, Chiranjeev242, Restart32, Jokingrotten, Eslam Yosef, In-
nite Guru, Haroly, Yasuo Miyakawa, Test, Murph9000, Risc64, Hazim116, Tom29739, Lemondoge, Kurousagi, UpsandDowns1234,
Pandamaury, WannaBeEditor, Positronon, Misfoundings, Sharanyanaveen, Doulph88, Gmuenglishclass, JennishFernandis, Harmon758,
InternetArchiveBot, DBZFan30, , For the lols haha, GayAlienZ, DevinP6576, GreenC bot, John Hannibal Smith, Kainweir, Glu-
ons12, Unkown934, Sarraalqahtani, DNS1999, , Franckc2, Dboylolz, Woolw0w, Bender the Bot, Bullaful, FL3SH, Max berlings,
Necabi, Canijustgo, Mdikici4001, Clover100, Jamesede, Djcruz94, Dmtschida, JasonJson, Laurdecl, Nutinmyfactsmydude, Wikiguruman,
Gogogirl77, Shakilbhuiyan.bd, Shreesudhu, Kiernaoneill and Anonymous: 1329
12.2 Images
File:Edit-clear.svg Source: https://upload.wikimedia.org/wikipedia/en/f/f2/Edit-clear.svg License: Public domain Contributors: The
Tango! Desktop Project. Original artist:
The people from the Tango! project. And according to the meta-data in the le, specically: Andreas Nilsson, and Jakub Steiner (although
minimally).
File:Stachledraht_DDos_Attack.svg Source: https://upload.wikimedia.org/wikipedia/commons/3/3f/Stachledraht_DDos_Attack.svg
License: LGPL Contributors: All Crystal icons were posted by the author as LGPL on kde-look Original artist: Everaldo Coelho and
YellowIcon