skip to main content
10.1145/3576915.3624382acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: Longitudinal Analysis of DoS Attacks

Published:21 November 2023Publication History

ABSTRACT

Denial-of-Service (DoS) attacks have become a regular occurrence in the digital world of today. Easy-to-use attack software via download and botnet services that can be rented cheaply in the darknet enable adversaries to conduct such attacks without requiring a comprehensive knowledge of the techniques.

To investigate this threat, we conduct a study on DoS attacks that occurred between 1 January 2015 and 31 December 2022. We gather statistics regarding the victims and on how the attacks were conducted. Furthermore, we show possible side effects of such attacks on critical Internet infrastructure.

This study provides interesting insights as well as observations and is useful for researchers and experts for developing defenses to mitigate DoS attacks. We therefore make our dataset publicly available.

References

  1. BBC. 2015. Thai government websites hit by denial-of-service attack. https://www.bbc.com/news/world-asia-34409343 (retrieved 27 October 2022).Google ScholarGoogle Scholar
  2. Mazebolt Blog. 2022. List of DDoS attacks. https://blog.mazebolt.com/hs-search-results?term=listddos (retrieved 28 October 2022).Google ScholarGoogle Scholar
  3. Certificate Transparency. 2023. Logs. https://certificate.transparency.dev/logs/ (retrieved 25 April 2023).Google ScholarGoogle Scholar
  4. Alex Forster. 2015. An update from Linode about the recent DDoS attacks. Linode Status. https://status.linode.com/incidents/mmdbljlglnfd (retrieved 25 October 2022).Google ScholarGoogle Scholar
  5. IPinfo. 2023. IP address details. https://ipinfo.io/ (retrieved 25 April 2023).Google ScholarGoogle Scholar
  6. John Kristoff, Randy Bush, Chris Kanich, George Michaelson, Amreesh Phokeer, Thomas C. Schmidt, and Matthias Wählisch. 2020. On Measuring RPKI Relying Parties. In Proceedings of the ACM Internet Measurement Conference (IMC '20). 484--491.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jesse Newland. 2015. Large Scale DDoS Attack on github.com. Github Blog. https://github.blog/2015-03-27-large-scale-ddos-attack-on-github-com/ (retrieved 25 October 2022).Google ScholarGoogle Scholar
  8. Public-DNS. 2023. Public DNS Server List. https://public-dns.info/ (retrieved 25 April 2023).Google ScholarGoogle Scholar
  9. Security Trails. 2023. Historical Data. https://securitytrails.com/ (retrieved 25 April 2023).Google ScholarGoogle Scholar
  10. Vijay Sundaram. 2015. Zoho services under criminal attack. Zoho Blog. https://www.zoho.com/blog/service-updates/zoho-services-under-criminal-attack.html (retrieved 25 October 2022).Google ScholarGoogle Scholar
  11. Super IP. 2023. IP address history of domains. https://suip.biz/?act=domainiphistory (retrieved 25 April 2023).Google ScholarGoogle Scholar
  12. DYN Technical Support Team. 2016. DDoS Attack Against Dyn Managed DNS. Incident Report for Oracle Dyn. Dyn Status Updates. https://www.dynstatus.com/incidents/nlr4yrr162t8 (retrieved 25 October 2022).Google ScholarGoogle Scholar
  13. Lionel Sujay Vailshery. 2022. Number of Internet of Things (IoT) connected devices worldwide from 2019 to 2021, with forecasts from 2022 to 2030. Statista. https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/ (retrieved 25 October 2022).Google ScholarGoogle Scholar
  14. Viewdns. 2023. IP History. https://viewdns.info/iphistory/ (retrieved 25 April 2023).Google ScholarGoogle Scholar
  15. W3Techs - World Wide Web Technology Surveys. 2023. Usage statistics of SSL certificate authorities for websites. https://w3techs.com/technologies/overview/ssl_certificate (retrieved 16 May 2023).Google ScholarGoogle Scholar

Index Terms

  1. Poster: Longitudinal Analysis of DoS Attacks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
      November 2023
      3722 pages
      ISBN:9798400700507
      DOI:10.1145/3576915

      Copyright © 2023 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 November 2023

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA
    • Article Metrics

      • Downloads (Last 12 months)140
      • Downloads (Last 6 weeks)19

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader