Large Distributed Denial-of-Service (DDoS) attacks pose a major threat not only to end systems but also to the Internet infrastructure as a whole. Remote Triggered Black Hole filtering (RTBH) has been established as a tool to mitigate inter-domain DDoS attacks by discarding unwanted traffic early in the network, e.g., at Internet eXchange Points (IXPs). As of today, little is known about the kind and effectiveness of its use, and about the need for more fine-grained filtering. In this paper, we present the first in-depth statistical analysis of all RTBH events at a large European IXP by correlating measurements of the data and the control plane for a period of 104 days. We identify a surprising practise that significantly deviates from the ...
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP) amplification, whi...
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP) amplification, whi...
Booter services continue to provide popular DDoS-as-a-service platforms and enable anyone irrespecti...
© Owner/Author 2017. This is the author's version of the work. It is posted here for your personal u...
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange rea...
BGP blackholing is a common technique used to mitigate DDoS at-tacks. Generally, the victim sends in...
In this poster, we analyze Denial of Service attacks from two vantage points, a national Internet Se...
Remotely triggered black hole (RTBH) filtering is a technique that provides the ability to drop unde...
BGP blackholing is an operational countermeasure that builds upon the capabilities of BGP to achieve...
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP) amplification, whi...
Distributed denial-of-service (DDoS) attacks are nowadays easy and cheap to carry out, and have beco...
Unsolicited one-way Internet traffic, also called Internet background radiation (IBR), has been used...
© ACM 2018. This is the author's version of the work. It is posted here for your personal use. Not f...
In this paper, we shed new light on the DNS amplification ecosystem, by studying complementary data ...
Booter services continue to provide popular DDoS-as-a-service platforms and enable anyone irrespecti...
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP) amplification, whi...
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP) amplification, whi...
Booter services continue to provide popular DDoS-as-a-service platforms and enable anyone irrespecti...
© Owner/Author 2017. This is the author's version of the work. It is posted here for your personal u...
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange rea...
BGP blackholing is a common technique used to mitigate DDoS at-tacks. Generally, the victim sends in...
In this poster, we analyze Denial of Service attacks from two vantage points, a national Internet Se...
Remotely triggered black hole (RTBH) filtering is a technique that provides the ability to drop unde...
BGP blackholing is an operational countermeasure that builds upon the capabilities of BGP to achieve...
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP) amplification, whi...
Distributed denial-of-service (DDoS) attacks are nowadays easy and cheap to carry out, and have beco...
Unsolicited one-way Internet traffic, also called Internet background radiation (IBR), has been used...
© ACM 2018. This is the author's version of the work. It is posted here for your personal use. Not f...
In this paper, we shed new light on the DNS amplification ecosystem, by studying complementary data ...
Booter services continue to provide popular DDoS-as-a-service platforms and enable anyone irrespecti...
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP) amplification, whi...
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP) amplification, whi...
Booter services continue to provide popular DDoS-as-a-service platforms and enable anyone irrespecti...