Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/8932
Full metadata record
DC FieldValueLanguage
dc.contributor.authorErcan, Emre Muraten_US
dc.contributor.authorSelçuk, Ali Aydınen_US
dc.date.accessioned2022-11-30T19:23:57Z-
dc.date.available2022-11-30T19:23:57Z-
dc.date.issued2021-
dc.identifier.issn2147-0030-
dc.identifier.urihttps://search.trdizin.gov.tr/yayin/detay/522859-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/8932-
dc.description.abstractOne of the best-known cyber attacks, distributed denial of service (DDoS), is evolving. It has become much more malefic and effective with the use of amplification power of reflected messages. This attack is known as the distributed reflected denial of service (DRDoS) or the amplification attack. Attackers abuse UDP-based protocols’ connectionless property for this attack and achieve an attack volume of hundreds of Gbps. The attack occurs by botnets’ spoofing a victim’s IP address and demanding some service from unhardened servers. Attackers generally prefer protocols that have high a “amplification factor” such as NTP and Memcached, or protocols where it is hard to differentiate legal requests from malicious ones, such as DNS. At this point, an important defensive strategy against these attacks is to harden servers not to play a role as amplifiers. In this paper, we carried out a detailed research of servers in 41 European countries and focused on three UDP-based protocols most commonly abused by attackers: DNS, NTP, and Memcached. We searched these servers by automatic regional scans and analyzed whether they have been hardened against DRDoS attacks.en_US
dc.language.isoenen_US
dc.relation.ispartofINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCEen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.titleA Study on Exploitable DRDoS Amplifiers in Europeen_US
dc.typeArticleen_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.identifier.volume10en_US
dc.identifier.issue2en_US
dc.identifier.startpage26en_US
dc.identifier.endpage41en_US
dc.institutionauthorSelçuk, Ali Aydinen_US
dc.relation.publicationcategoryMakale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.trdizinid522859en_US
dc.ozel2022v3_Editen_US
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairetypeArticle-
item.grantfulltextnone-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
TR Dizin İndeksli Yayınlar / TR Dizin Indexed Publications Collection
Show simple item record



CORE Recommender

Page view(s)

56
checked on Apr 22, 2024

Google ScholarTM

Check





Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.