SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots

02/09/2023
by   Marcin Nawrocki, et al.
0

In this paper, we revisit the use of honeypots for detecting reflective amplification attacks. These measurement tools require careful design of both data collection and data analysis including cautious threshold inference. We survey common amplification honeypot platforms as well as the underlying methods to infer attack detection thresholds and to extract knowledge from the data. By systematically exploring the threshold space, we find most honeypot platforms produce comparable results despite their different configurations. Moreover, by applying data from a large-scale honeypot deployment, network telescopes, and a real-world baseline obtained from a leading DDoS mitigation provider, we question the fundamental assumption of honeypot research that convergence of observations can imply their completeness. Conclusively we derive guidance on precise, reproducible honeypot research, and present open challenges.

READ FULL TEXT

page 1

page 6

research
07/25/2022

OpenRAN Gym: AI/ML Development, Data Collection, and Testing for O-RAN on PAWR Platforms

Open Radio Access Network (RAN) architectures will enable interoperabili...
research
02/21/2022

OpenRAN Gym: An Open Toolbox for Data Collection and Experimentation with AI in O-RAN

Open Radio Access Network (RAN) architectures will enable interoperabili...
research
09/20/2021

Distributed Detection and Mitigation of Biasing Attacks over Multi-Agent Networks

This paper proposes a distributed attack detection and mitigation techni...
research
03/07/2023

Exploring the Limits of Indiscriminate Data Poisoning Attacks

Indiscriminate data poisoning attacks aim to decrease a model's test acc...
research
03/17/2020

Data-Driven Attack Detection for Linear Systems

This paper studies the attack detection problem in a data-driven and mod...
research
12/15/2021

Measure and Improve Robustness in NLP Models: A Survey

As NLP models achieved state-of-the-art performances over benchmarks and...
research
10/22/2020

Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks

Due to recent world events, video calls have become the new norm for bot...

Please sign up or login with your details

Forgot password? Click here to reset