ABSTRACT
Denial-of-Service (DoS) attacks have become a regular occurrence in the digital world of today. Easy-to-use attack software via download and botnet services that can be rented cheaply in the darknet enable adversaries to conduct such attacks without requiring a comprehensive knowledge of the techniques.
To investigate this threat, we conduct a study on DoS attacks that occurred between 1 January 2015 and 31 December 2022. We gather statistics regarding the victims and on how the attacks were conducted. Furthermore, we show possible side effects of such attacks on critical Internet infrastructure.
This study provides interesting insights as well as observations and is useful for researchers and experts for developing defenses to mitigate DoS attacks. We therefore make our dataset publicly available.
- BBC. 2015. Thai government websites hit by denial-of-service attack. https://www.bbc.com/news/world-asia-34409343 (retrieved 27 October 2022).Google Scholar
- Mazebolt Blog. 2022. List of DDoS attacks. https://blog.mazebolt.com/hs-search-results?term=listddos (retrieved 28 October 2022).Google Scholar
- Certificate Transparency. 2023. Logs. https://certificate.transparency.dev/logs/ (retrieved 25 April 2023).Google Scholar
- Alex Forster. 2015. An update from Linode about the recent DDoS attacks. Linode Status. https://status.linode.com/incidents/mmdbljlglnfd (retrieved 25 October 2022).Google Scholar
- IPinfo. 2023. IP address details. https://ipinfo.io/ (retrieved 25 April 2023).Google Scholar
- John Kristoff, Randy Bush, Chris Kanich, George Michaelson, Amreesh Phokeer, Thomas C. Schmidt, and Matthias Wählisch. 2020. On Measuring RPKI Relying Parties. In Proceedings of the ACM Internet Measurement Conference (IMC '20). 484--491.Google ScholarDigital Library
- Jesse Newland. 2015. Large Scale DDoS Attack on github.com. Github Blog. https://github.blog/2015-03-27-large-scale-ddos-attack-on-github-com/ (retrieved 25 October 2022).Google Scholar
- Public-DNS. 2023. Public DNS Server List. https://public-dns.info/ (retrieved 25 April 2023).Google Scholar
- Security Trails. 2023. Historical Data. https://securitytrails.com/ (retrieved 25 April 2023).Google Scholar
- Vijay Sundaram. 2015. Zoho services under criminal attack. Zoho Blog. https://www.zoho.com/blog/service-updates/zoho-services-under-criminal-attack.html (retrieved 25 October 2022).Google Scholar
- Super IP. 2023. IP address history of domains. https://suip.biz/?act=domainiphistory (retrieved 25 April 2023).Google Scholar
- DYN Technical Support Team. 2016. DDoS Attack Against Dyn Managed DNS. Incident Report for Oracle Dyn. Dyn Status Updates. https://www.dynstatus.com/incidents/nlr4yrr162t8 (retrieved 25 October 2022).Google Scholar
- Lionel Sujay Vailshery. 2022. Number of Internet of Things (IoT) connected devices worldwide from 2019 to 2021, with forecasts from 2022 to 2030. Statista. https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/ (retrieved 25 October 2022).Google Scholar
- Viewdns. 2023. IP History. https://viewdns.info/iphistory/ (retrieved 25 April 2023).Google Scholar
- W3Techs - World Wide Web Technology Surveys. 2023. Usage statistics of SSL certificate authorities for websites. https://w3techs.com/technologies/overview/ssl_certificate (retrieved 16 May 2023).Google Scholar
Index Terms
- Poster: Longitudinal Analysis of DoS Attacks
Recommendations
Machine learning combating DOS and DDOS attacks
In recent years, technology is booming at a breakneck speed as so the need of security. Vulnerabilities in the layers of the OSI model and the networks are paving new ways for intruders and hackers to steal the confidential information. Security attacks ...
Mitigating DoS Using Sensing Keys
ICCS '12: Proceedings of the 2012 International Conference on Computing SciencesDenial of Service (DoS) attacks has become a major problem for users of computer systems connected to the Internet. DoS attackers hijack secondary victim systems and use them to wage a coordinated large-scale attack against primary victim systems. In ...
Rogue Access Point Based DoS Attacks against 802.11 WLANs
AICT '08: Proceedings of the 2008 Fourth Advanced International Conference on TelecommunicationsThe growing popularity of the 802.11-based Wireless LAN (WLAN) also increases its risk of security attacks. This paper presents an analysis and solution to two Denial of Service (DoS) attacks: Deauthentication flooding (DeauthF) and disassociation ...
Comments