DDoS Hide Seek: On the Effectiveness of a Booter Services Takedown

09/16/2019
by   Daniel Kopp, et al.
0

Booter services continue to provide popular DDoS-as-a-service platforms and enable anyone irrespective of their technical ability, to execute DDoS attacks with devastating impact. Since booters are a serious threat to Internet operations and can cause significant financial and reputational damage, they also draw the attention of law enforcement agencies and related counter activities. In this paper, we investigate booter-based DDoS attacks in the wild and the impact of an FBI takedown targeting 15 booter websites in December 2018 from the perspective of a major IXP and two ISPs. We study and compare attack properties of multiple booter services by launching Gbps-level attacks against our own infrastructure. To understand spatial and temporal trends of the DDoS traffic originating from booters we scrutinize 5 months, worth of inter-domain traffic. We observe that the takedown only leads to a temporary reduction in attack traffic. Additionally, one booter was found to quickly continue operation by using a new domain for its website.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/07/2021

DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks

DDoS attacks remain a major security threat to the continuous operation ...
research
06/21/2018

Oh, What a Fragile Web We Weave: Third-party Service Dependencies In Modern Webservices and Implications

The recent October 2016 DDoS attack on Dyn served as a wakeup call to th...
research
05/14/2019

A Proactive Design to Detect Denial of Service Attacks Using SNMP-MIB ICMP Variables

Denial of Service (DOS) attack is one of the most attack that attract th...
research
03/02/2021

Gotta CAPTCHA 'Em All: A Survey of Twenty years of the Human-or-Computer Dilemma

A recent study has found that malicious bots generated nearly a quarter ...
research
11/10/2017

Traffic Analysis with Deep Learning

Deep Neural Networks (DNN) has obtained enormous attention with its adva...
research
09/17/2019

ShamFinder: An Automated Framework for Detecting IDN Homographs

The internationalized domain name (IDN) is a mechanism that enables us t...
research
04/05/2019

Efficient attack countermeasure selection accounting for recovery and action costs

The losses arising from a system being hit by cyber attacks can be stagg...

Please sign up or login with your details

Forgot password? Click here to reset