Abstract
Distributed denial of service (DDoS) attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers. Thereafter, we apply this model to evaluate 27 distinct attack events from 2016. We make use of a DDoS specific longitudinal news database to select these attack events. We find the proposed model useful in analysing attack aims. We also find that in some cases attackers might target a web infrastructure just because it is virtually invincible.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Google Alerts is a content change detection and notification service. A user of this service can keep themselves updated about the topic of their choice. The service notifies with two types of alerts: (1) News (2) Web. News alerts report about content posted on news websites, all others are categorised as web alerts.
References
Anonymous attacks Italian government portals because of gas pipeline project (2016)
Anonymous takes down Nissan website in protest of Japanese whale killings (2016)
Australian 2016 census sabotage puts a question mark on private cloud (2016)
Battlefield 1 beta: You have lost connection to ea servers (2016)
Bitcoin exchange BTC-e resumes services after latest DDoS attack (2016)
Blizzard hit with another DDoS attack, overwatch, wow, hearthstone and more down (2016)
DDoS attacks caused StarHub broadband outages (2016)
The DDoS vigilantes trying to silence black lives matter (2016)
Donald Trump sweeping American polls, Canadian migration website down (2016)
Dyn statement on 10/21/2016 DDoS attack (2016)
Eir’s webmail affected by DDoS attack (2016)
Ethereum’s network is currently suffering from a computational DDoS attack (2016)
European commission hit by DDoS attack (2016)
Failed Mirai botnet attack downed 900000 Germans’ internet access (2016)
Govt websites forced offline in DDoS attack (2016)
Hacker group anonymous shuts down KKK website (2016)
HSBC online banking is ‘attacked’ (2016)
Internet providers claim cyber attack, to meet senior cop (2016)
Irish lottery site and ticket machines hit by DDoS attack (2016)
KrebsOnSecurity hit with record DDoS (2016)
Pokemon go down: Hacking group claims credit for taking down servers ‘with ddos attack’ (2016)
Presidential candidate websites targeted (2016)
Steam connection servers down in probable DDoS attack (2016)
Tumblr goes down after hacker attack (2016)
Web host hit by DDoS of over 1Tbps (2016)
WikiLeaks comes under ‘unrelenting’ cyber attack that briefly prevents it from releasing more emails linked to Hillary Clinton on election day (2016)
William Hill website under siege from DDoS attacks (2016)
Abhishta, A., Joosten, R., Jonker, M., Kamerman, W., Nieuwenhuis, L.J.M.: Poster: collecting contextual information about a DDoS attack event using Google alerts (2019)
Anderson, R., Barton, C., Bohm, R., Clayton, R., Van Eeten, M.J.G., Levi, M., Moore, T., Savage, S.: Measuring the Cost of Cybercrime. In: Workshop on Economics of Information Security (2012)
Cohen, L.E., Felson, M.: Social change and crime rate trends: a routine activity approach. Am. Sociol. Rev. 44(4), 588–608 (1979)
Cromwell, P., Olson, J.N.: The reasoning burglar: motives and decision-making strategies. In: In Their Own Words. Roxbury Publishing Company, Los Angeles (2006)
Gandhi, R.A., Sharma, A.C., Mahoney, W., Sousan, W., Zhu, Q.: Dimensions of cyber-attacks: cultural, social, economic, and political. IEEE Technol. Soc. Mag. 30(1), 28–38 (2011)
Geers, K., Kindlund, D., Moran, N., Rachwald, R.: WORLD WAR C: understanding nation-state motives behind today’s advanced cyber attacks (2013)
Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5, 438–457 (2002)
Hutchings, A., Clayton, R.: Exploring the provision of online booter services. Deviant Behav. 37(10), 1163–1178 (2016)
Johnson, S.D.: A brief history of the analysis of crime concentration. Eur. J. Appl. Math. 21(4–5), 349–370 (2010)
Kallus, N.: Predicting crowd behavior with big public data. In: Proceedings of the 23rd International Conference on World Wide Web, WWW 2014 Companion, pp. 625–630. ACM, New York (2014)
Kumar, S., Carley, K.M.: Understanding DDoS cyber-attacks using social media analytics. In: IEEE Conference on Intelligence and Security Informatics (ISI) (2016)
Leukfeldt, E.R., Yar, M.: Applying routine activity theory to cybercrime: a theoretical and empirical analysis. Deviant Behav. 37(3), 263–280 (2016)
Liu, S., Cheng, B.: Cyberattacks: why, what, who, and how. IT Prof. 11(3) (2009)
Nazario, J.: Politically motivated denial of service attacks. In: Cryptology and Information Security Series (2009)
Paulson, R.A., Weber, J.: Cyberextortion: an overview of distributed denial of service (2006)
Sauter, M.: “LOIC Will Tear Us Apart”: the impact of tool design and media portrayals in the success of activist DDOS attacks. Am. Behav. Sci. 57, 983–1007 (2013)
Sharma, A.C., Gandhi, R.A., Mahoney, W., Sousan, W., Zhu, Q., Laplante, P.: Building a social dimensional threat model from current and historic events of cyber attacks. In: IEEE Second International Conference on Social Computing (2010)
Yar, M.: The novelty of cybercrime an assessment in light of routine activity theory. Eur. J. Criminol. 2(4), 407–427 (2005)
Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15, 2046–2069 (2013)
Acknowledgments
This work is part of the NWO: D3 project, which is funded by the Netherlands Organization for Scientific Research (628.001.018).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Abhishta, A., Junger, M., Joosten, R., Nieuwenhuis, L.J.M. (2020). A Note on Analysing the Attacker Aims Behind DDoS Attacks. In: Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., Ivanovic, M. (eds) Intelligent Distributed Computing XIII. IDC 2019. Studies in Computational Intelligence, vol 868. Springer, Cham. https://doi.org/10.1007/978-3-030-32258-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-32258-8_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32257-1
Online ISBN: 978-3-030-32258-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)