"LUDO" - Kids playing Distributed Denial of Service

Jessica Steinberger, José Jair Cardoso de Santanna, E. Spatharas, H. Amler, N. Breuer, K. Graul, B. Kuhnert, U. Piontek, Anna Sperotto, H. Baier, Aiko Pras

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    52 Downloads (Pure)

    Abstract

    Distributed denial of service attacks pose a serious threat to the availability of the network infrastructures and services. GE̿ANT, the pan-European network with terabit capacities witnesses close to hundreds of DDoS attacks on a daily basis. The reason is that DDoS attacks are getting larger, more sophisticated and frequent. At the same time, it has never been easier to execute DDoS attacks, e.g., Booter services offer paying customers without any technical knowledge the possibility to perform DDoS attacks as a service. Given the increasing size, frequency and complexity of DDoS attacks, there is a need to perform a collaborative mitigation. Therefore, we developed (i) a DDoSDB to share real attack data and allow collaborators to query, compare, and download attacks, (ii) the Security attack experimentation framework to test mitigation and response capabilities and (iii) a collaborative mitigation and response process among trusted partners to disseminate security event information. In addition to these developments, we present and would like to discuss our latest research results with experienced networking operators and bridging the gap between academic research and operational business.
    Original languageUndefined
    Title of host publicationProceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016)
    EditorsJohan Bergström, Gyöngyi Hórvath, Brook Schofield
    Place of PublicationSweden
    PublisherEUNIS Research and Analysis Initiative
    Pages3
    Number of pages15
    Publication statusPublished - 15 Dec 2016

    Publication series

    NameEuropean Journal of Higher Education IT
    PublisherEUNIS Research and Analysis Initiative
    Volume2016-02
    ISSN (Print)2519-1764

    Keywords

    • EWI-27042

    Cite this