Quiet dogs can bite: Which Booters should we go after, and what are our mitigation options?

José Jair Santanna, Ricardo O. De Schmidt, Daphne Tuncer, Anna Sperotto, Lisandro Z. Granville, Aiko Pras

    Research output: Contribution to journalArticleAcademicpeer-review

    3 Citations (Scopus)
    22 Downloads (Pure)

    Abstract

    Large network security companies often report websites, called Booters, that offer DDoS attacks as a paid service as the primary reason for the increase in occurrence and power of attacks. Although hundreds of active Booters exist today, only a handful of those that promoted massive attacks faced mitigation and prosecution actions. In this tutorial article we focus our attention on Booters that are "under the radar" of security initiatives, by advertising high attack power and being very popular on the Internet. We discuss and provide grounds for critical thinking on what should be further done toward Booter mitigation.

    Original languageEnglish
    Article number7981523
    Pages (from-to)50-56
    Number of pages7
    JournalIEEE communications magazine
    Volume55
    Issue number7
    DOIs
    Publication statusPublished - 1 Jul 2017

    Keywords

    • 22/4 OA procedure

    Fingerprint

    Dive into the research topics of 'Quiet dogs can bite: Which Booters should we go after, and what are our mitigation options?'. Together they form a unique fingerprint.

    Cite this