A Note on Analysing the Attacker Aims Behind DDoS Attacks

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

86 Downloads (Pure)

Abstract

DDoS attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers. Thereafter, we apply this model to evaluate 27 distinct attack events from 2016. We make use of a DDoS specific longitudinal news database to select these attack events. We find the proposed model useful in analysing attack aims. We also find that in some cases attackers might target a web infrastructure just because it is virtually invincible.
Original languageEnglish
Title of host publicationIntelligent Distributed Computing XIII
EditorsIgor Kotenko, Costin Badica, Vasily Desnitsky, Didier El Baz, Mirjana Ivanovic
PublisherSpringer
Pages255-265
ISBN (Electronic)978-3-030-32258-8
ISBN (Print)978-3-030-32257-1
DOIs
Publication statusE-pub ahead of print/First online - 2 Oct 2019
Event13th International Symposium on Intelligent Distributed Computing, IDC 2019 - ITMO Univeristy, Saint-Petersburg, Russian Federation
Duration: 7 Oct 201910 Oct 2019
Conference number: 13

Publication series

NameStudies in Computational Intelligence
Volume868

Conference

Conference13th International Symposium on Intelligent Distributed Computing, IDC 2019
Abbreviated titleIDC 2019
CountryRussian Federation
CitySaint-Petersburg
Period7/10/1910/10/19

Keywords

  • DDoS attacks
  • Routine Activity Theory
  • SPEC
  • Attacker Aims

Fingerprint Dive into the research topics of 'A Note on Analysing the Attacker Aims Behind DDoS Attacks'. Together they form a unique fingerprint.

  • Cite this

    Abhishta, A., Junger, M., Joosten, R., & Nieuwenhuis, L. J. M. (2019). A Note on Analysing the Attacker Aims Behind DDoS Attacks. In I. Kotenko, C. Badica, V. Desnitsky, D. El Baz, & M. Ivanovic (Eds.), Intelligent Distributed Computing XIII (pp. 255-265). [Chapter 30] (Studies in Computational Intelligence; Vol. 868). Springer. https://doi.org/10.1007/978-3-030-32258-8_30