TY - JOUR
T1 - Quiet dogs can bite
T2 - Which Booters should we go after, and what are our mitigation options?
AU - Santanna, José Jair
AU - De Schmidt, Ricardo O.
AU - Tuncer, Daphne
AU - Sperotto, Anna
AU - Granville, Lisandro Z.
AU - Pras, Aiko
PY - 2017/7/1
Y1 - 2017/7/1
N2 - Large network security companies often report websites, called Booters, that offer DDoS attacks as a paid service as the primary reason for the increase in occurrence and power of attacks. Although hundreds of active Booters exist today, only a handful of those that promoted massive attacks faced mitigation and prosecution actions. In this tutorial article we focus our attention on Booters that are "under the radar" of security initiatives, by advertising high attack power and being very popular on the Internet. We discuss and provide grounds for critical thinking on what should be further done toward Booter mitigation.
AB - Large network security companies often report websites, called Booters, that offer DDoS attacks as a paid service as the primary reason for the increase in occurrence and power of attacks. Although hundreds of active Booters exist today, only a handful of those that promoted massive attacks faced mitigation and prosecution actions. In this tutorial article we focus our attention on Booters that are "under the radar" of security initiatives, by advertising high attack power and being very popular on the Internet. We discuss and provide grounds for critical thinking on what should be further done toward Booter mitigation.
KW - 22/4 OA procedure
UR - http://www.scopus.com/inward/record.url?scp=85028431709&partnerID=8YFLogxK
U2 - 10.1109/MCOM.2017.1600992
DO - 10.1109/MCOM.2017.1600992
M3 - Article
AN - SCOPUS:85028431709
SN - 0163-6804
VL - 55
SP - 50
EP - 56
JO - IEEE communications magazine
JF - IEEE communications magazine
IS - 7
M1 - 7981523
ER -