A Note on Analysing the Attacker Aims Behind DDoS Attacks

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

28 Downloads (Pure)

Abstract

DDoS attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers. Thereafter, we apply this model to evaluate 27 distinct attack events from 2016. We make use of a DDoS specific longitudinal news database to select these attack events. We find the proposed model useful in analysing attack aims. We also find that in some cases attackers might target a web infrastructure just because it is virtually invincible.
Original languageEnglish
Title of host publicationIntelligent Distributed Computing XIII
EditorsIgor Kotenko, Costin Badica, Vasily Desnitsky, Didier El Baz, Mirjana Ivanovic
PublisherSpringer
Pages255-265
ISBN (Electronic)978-3-030-32258-8
ISBN (Print)978-3-030-32257-1
DOIs
Publication statusE-pub ahead of print/First online - 2 Oct 2019
Event13th International Symposium on Intelligent Distributed Computing, IDC 2019 - ITMO Univeristy, Saint-Petersburg, Russian Federation
Duration: 7 Oct 201910 Oct 2019
Conference number: 13

Publication series

NameStudies in Computational Intelligence
Volume868

Conference

Conference13th International Symposium on Intelligent Distributed Computing, IDC 2019
Abbreviated titleIDC 2019
CountryRussian Federation
CitySaint-Petersburg
Period7/10/1910/10/19

Fingerprint

Availability

Keywords

  • DDoS attacks
  • Routine Activity Theory
  • SPEC
  • Attacker Aims

Cite this

Abhishta, A., Junger, M., Joosten, R., & Nieuwenhuis, L. J. M. (2019). A Note on Analysing the Attacker Aims Behind DDoS Attacks. In I. Kotenko, C. Badica, V. Desnitsky, D. El Baz, & M. Ivanovic (Eds.), Intelligent Distributed Computing XIII (pp. 255-265). [Chapter 30] (Studies in Computational Intelligence; Vol. 868). Springer. https://doi.org/10.1007/978-3-030-32258-8_30
Abhishta, Abhishta ; Junger, Marianne ; Joosten, Reinoud ; Nieuwenhuis, Lambert J.M. / A Note on Analysing the Attacker Aims Behind DDoS Attacks. Intelligent Distributed Computing XIII. editor / Igor Kotenko ; Costin Badica ; Vasily Desnitsky ; Didier El Baz ; Mirjana Ivanovic. Springer, 2019. pp. 255-265 (Studies in Computational Intelligence).
@inbook{46ff84cc988b483b922c5c1ce969da0e,
title = "A Note on Analysing the Attacker Aims Behind DDoS Attacks",
abstract = "DDoS attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers. Thereafter, we apply this model to evaluate 27 distinct attack events from 2016. We make use of a DDoS specific longitudinal news database to select these attack events. We find the proposed model useful in analysing attack aims. We also find that in some cases attackers might target a web infrastructure just because it is virtually invincible.",
keywords = "DDoS attacks, Routine Activity Theory, SPEC, Attacker Aims",
author = "Abhishta Abhishta and Marianne Junger and Reinoud Joosten and Nieuwenhuis, {Lambert J.M.}",
year = "2019",
month = "10",
day = "2",
doi = "10.1007/978-3-030-32258-8_30",
language = "English",
isbn = "978-3-030-32257-1",
series = "Studies in Computational Intelligence",
publisher = "Springer",
pages = "255--265",
editor = "Igor Kotenko and Costin Badica and Vasily Desnitsky and {El Baz}, Didier and Mirjana Ivanovic",
booktitle = "Intelligent Distributed Computing XIII",

}

Abhishta, A, Junger, M, Joosten, R & Nieuwenhuis, LJM 2019, A Note on Analysing the Attacker Aims Behind DDoS Attacks. in I Kotenko, C Badica, V Desnitsky, D El Baz & M Ivanovic (eds), Intelligent Distributed Computing XIII., Chapter 30, Studies in Computational Intelligence, vol. 868, Springer, pp. 255-265, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, Saint-Petersburg, Russian Federation, 7/10/19. https://doi.org/10.1007/978-3-030-32258-8_30

A Note on Analysing the Attacker Aims Behind DDoS Attacks. / Abhishta, Abhishta; Junger, Marianne; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

Intelligent Distributed Computing XIII. ed. / Igor Kotenko; Costin Badica; Vasily Desnitsky; Didier El Baz; Mirjana Ivanovic. Springer, 2019. p. 255-265 Chapter 30 (Studies in Computational Intelligence; Vol. 868).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

TY - CHAP

T1 - A Note on Analysing the Attacker Aims Behind DDoS Attacks

AU - Abhishta, Abhishta

AU - Junger, Marianne

AU - Joosten, Reinoud

AU - Nieuwenhuis, Lambert J.M.

PY - 2019/10/2

Y1 - 2019/10/2

N2 - DDoS attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers. Thereafter, we apply this model to evaluate 27 distinct attack events from 2016. We make use of a DDoS specific longitudinal news database to select these attack events. We find the proposed model useful in analysing attack aims. We also find that in some cases attackers might target a web infrastructure just because it is virtually invincible.

AB - DDoS attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers. Thereafter, we apply this model to evaluate 27 distinct attack events from 2016. We make use of a DDoS specific longitudinal news database to select these attack events. We find the proposed model useful in analysing attack aims. We also find that in some cases attackers might target a web infrastructure just because it is virtually invincible.

KW - DDoS attacks

KW - Routine Activity Theory

KW - SPEC

KW - Attacker Aims

U2 - 10.1007/978-3-030-32258-8_30

DO - 10.1007/978-3-030-32258-8_30

M3 - Chapter

SN - 978-3-030-32257-1

T3 - Studies in Computational Intelligence

SP - 255

EP - 265

BT - Intelligent Distributed Computing XIII

A2 - Kotenko, Igor

A2 - Badica, Costin

A2 - Desnitsky, Vasily

A2 - El Baz, Didier

A2 - Ivanovic, Mirjana

PB - Springer

ER -

Abhishta A, Junger M, Joosten R, Nieuwenhuis LJM. A Note on Analysing the Attacker Aims Behind DDoS Attacks. In Kotenko I, Badica C, Desnitsky V, El Baz D, Ivanovic M, editors, Intelligent Distributed Computing XIII. Springer. 2019. p. 255-265. Chapter 30. (Studies in Computational Intelligence). https://doi.org/10.1007/978-3-030-32258-8_30