Distributed Denial-of-Service (DDoS) attacks continue to pose a serious threat to the availability of Internet services. The Domain Name System (DNS) is part of the core of the Internet and a crucial factor in the successful delivery of Internet services. Because of the importance of DNS, specialist service providers have sprung up in the market, that provide managed DNS services. One of their key selling points is that they protect DNS for a domain against DDoS attacks. But what if such a service becomes the target of a DDoS attack, and that attack succeeds? In this paper we analyse two such events, an attack on NS1 in May 2016, and an attack on Dyn in October 2016. We do this by analysing the change in the behaviour of the service's custo...
Distributed Denial-of-Service (DDoS) attacks continue to be a major threat in the Internet today. DD...
In this paper, we shed new light on the DNS amplification ecosys- tem, by studying complementary dat...
DNS infrastructure hijacks are a class of attacks wherein the attack is theresult of an attacker con...
Distributed Denial-of-Service (DDoS) attacks continue to pose a serious threat to the availability o...
Denial of Service (DDoS) attacks both abuse and target core Internet infrastructures and services, i...
Denial of Service (DDoS) attacks both abuse and target core Internet infrastructures and services, i...
We leverage large-scale DNS measurement data on authoritative name servers to study the reactions of...
Distributed Denial-of-Service (DDoS) attacks have steadily gained in popularity over the last decade...
Distributed Denial-of-Service (DDoS) attacks have seen a steady rise in popularity in the last 5 yea...
Denial-of-Service attacks have rapidly gained in popularity over the last decade. The increase in fr...
Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the D...
Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the D...
Distributed denial-of-service (DDoS) attacks are nowadays easy and cheap to carry out, and have beco...
Attackers have used DNS amplification in over 34% of high- volume DDoS attacks, with some floods exc...
In this paper, we shed new light on the DNS amplification ecosystem, by studying complementary data ...
Distributed Denial-of-Service (DDoS) attacks continue to be a major threat in the Internet today. DD...
In this paper, we shed new light on the DNS amplification ecosys- tem, by studying complementary dat...
DNS infrastructure hijacks are a class of attacks wherein the attack is theresult of an attacker con...
Distributed Denial-of-Service (DDoS) attacks continue to pose a serious threat to the availability o...
Denial of Service (DDoS) attacks both abuse and target core Internet infrastructures and services, i...
Denial of Service (DDoS) attacks both abuse and target core Internet infrastructures and services, i...
We leverage large-scale DNS measurement data on authoritative name servers to study the reactions of...
Distributed Denial-of-Service (DDoS) attacks have steadily gained in popularity over the last decade...
Distributed Denial-of-Service (DDoS) attacks have seen a steady rise in popularity in the last 5 yea...
Denial-of-Service attacks have rapidly gained in popularity over the last decade. The increase in fr...
Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the D...
Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the D...
Distributed denial-of-service (DDoS) attacks are nowadays easy and cheap to carry out, and have beco...
Attackers have used DNS amplification in over 34% of high- volume DDoS attacks, with some floods exc...
In this paper, we shed new light on the DNS amplification ecosystem, by studying complementary data ...
Distributed Denial-of-Service (DDoS) attacks continue to be a major threat in the Internet today. DD...
In this paper, we shed new light on the DNS amplification ecosys- tem, by studying complementary dat...
DNS infrastructure hijacks are a class of attacks wherein the attack is theresult of an attacker con...