Skip to main content

Service in Denial – Clouds Going with the Winds

  • Conference paper
  • First Online:
Network and System Security (NSS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9408))

Included in the following conference series:

Abstract

We analyze the threat of DDoS-for-hire services to low and medium power cloud-based servers or home users. We aim to investigate popularity and availability of such services, their payment models, subscription pricing, complexity of the generated attack traffic and performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. SimilarWeb. http://www.similarweb.com (accessed June 26, 2015)

  2. Karami, M., McCoy, D.: Understanding the emerging threat of DDoS-as-a-Service. In: 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (2013)

    Google Scholar 

  3. Bukac, V.: DDoS-Vault project (2015). https://github.com/crocs-muni/ddos-vault/wiki (accessed August 16, 2015)

  4. Akamai. The State of the Internet Report Q4 2014. Technical report (2015)

    Google Scholar 

  5. Sood, A.K., Enbody, R.J.: Crimeware-as-a-service - A survey of commoditized crimeware in the underground market. International Journal of Critical Infrastructure Protection 6(1), 28–38 (2013)

    Article  Google Scholar 

  6. Czyz, J., Kallitsis, M., Gharaibeh, M., Papadopoulos, C., Bailey, M., Karir, M.: Taming the 800 Pound Gorilla: the rise and decline of NTP DDoS attacks. In: Proceedings of the 2014 Conference on Internet Measurement. ACM (2014)

    Google Scholar 

  7. PLXsert. SSDP Reflection DDoS Attacks. PLXsert Threat Advisory, September 2014

    Google Scholar 

  8. Kornblum, J.: Identifying almost identical files using context triggered piecewise hashing. Digital Investigation 3 (2006)

    Google Scholar 

  9. Yu, S., Tian, Y., Guo, S., Wu, D.: Can We Beat DDoS Attacks in Clouds?. IEEE Transactions on Parallel and Distributed Systems 25(9) (2014)

    Google Scholar 

  10. Krebs, B.: DDoS Services Advertise Openly, Take PayPal, May 2013. http://krebsonsecurity.com/2013/05/ddos-services-advertise-openly-take-paypal/ (accessed August 16, 2015)

  11. Krebs, B.: Lizard Kids: A Long Trail of Fail, December 2014. http://krebsonsecurity.com/2014/12/lizard-kids-a-long-trail-of-fail (accessed August 16, 2015)

  12. Santanna, J.J., van Rijswijk-Deij, R., Sperotto, A., Hofstede, R., Wierbosch, M., Zambenedetti Granville, L., Pras, A.: Booters - an analysis of DDoS-as-a-service attacks. In: Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management (2015)

    Google Scholar 

  13. Santanna, J.J., Durban, R., Sperotto, A., Pras, A.: Inside booters: an analysis on operational databases. In: Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vit Bukac .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Bukac, V., Stavova, V., Nemec, L., Riha, Z., Matyas, V. (2015). Service in Denial – Clouds Going with the Winds. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science(), vol 9408. Springer, Cham. https://doi.org/10.1007/978-3-319-25645-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25645-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25644-3

  • Online ISBN: 978-3-319-25645-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics