GMI-DDOS Recommended Reading List
Reading List
- Detection of zero-day attacks: An unsupervised port-based approach
- Weaponizing Middleboxes for TCP Reflected Amplification
- DDoS Cyber-Incident Detection in Smart Grids
- Jorge C. Merlino, Mohammed Asiri and Neetesh Saxena
- Full text article
- The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core
- Into the DDoS maelstrom: a longitudinal study of a scrubbing service
- Characterizing Certain DNS DDoS Attacks
- Enhancing the Performance of Detect DRDoS DNS Attacks Based on the Machine Learning and Proactive Feature Selection (PFS) Model
- Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter
- Measuring the adoption of DDoS protection services
- Millions of Targets Under Attack: a Macroscopic Characterization of the DoS Ecosystem
- The DDoS Threat Landscape Report
- IXP Scrubber: Learning from Blackholing Traffic for ML-Driven DDoS Detection at Scale
- Matthias Wichtlhuber, Eric Strehle, Lars Prepens, Alina Rubina, Daniel Kopp, Stefan Stegmüller, Christoph Dietzel, Oliver Hohlfeld.
- United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale
- Daniel Wagner, Daniel Kopp, Matthias Wichtlhuber, Christoph Dietzel, Oliver Hohlfeld, Georgios Smaragdakis, Anja Feldmann.
- DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks
- Daniel Kopp, Christoph Dietzel, Oliver Hohlfeld.
- DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown
- Daniel Kopp, Matthias Wichtlhuber, Ingmar Poese, José Jair Cardoso de Santanna, Oliver Hohlfeld, Christoph Dietzel.
- Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event
- Giovane C. M. Moura, Ricardo de O. Schmidt, John Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei and Christian Hesselman.
- Amplification Hell: Revisiting Network Protocols for DDoS Abuse
- Christian Rossow. NDSS’14.
- Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
- Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz. USENIX’14.
- Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks
- Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz. WOOT’14.
- AmpPot: Monitoring and Defending Against Amplification DDoS Attacks
- Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow. RAID ‘15.
- Identifying the Scanners and Attack Infrastructure behind Amplification DDoS attacks
- Johannes Krupp, Michael Backes, Christian Rossow. CCS ‘16.
- Linking Amplification DDoS Attacks to Booter Services
- Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes. RAID ‘17.
- BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks
- Johannes Krupp, Christian Rossow. EuroS&P ‘21
- ANYway: Measuring the Amplification DDoS Potential of Domains
- Olivier van der Toorn, Johannes Krupp, Mattijs Jonker, Roland van Rijswijk-Deij, Christian Rossow, Anna Sperotto. CSNM ‘21.
- Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope,
- On the Interplay between TLS Certificates and QUIC Performance
- The Race to the Vulnerable: Measuring the Log4j Shell Incident
- Raphael Hiesgen, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch. TMA 2022.
- Preprint
- Transparent Forwarders: An Unnoticed Component of the Open DNS Infrastructure
- QUICsand: Quantifying QUIC Reconnaissance Scans and DoS Flooding Events
- From the Beginning: Key Transitions in the First 15 Years of DNSSEC
- Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs
- On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP
- Waiting for QUIC: On the Opportunities of Passive Measurements to Understand QUIC Deployments,
- Jonas Mücke, Marcin Nawrocki, Raphael Hiesgen, Patrick Sattler, Johannes Zirngibl, Georg Carle, Thomas C. Schmidt, Matthias Wählisch. Technical Report, No. arXiv:2209.00965, September 2022.
- Preprint
- Akamai DNS: Providing Authoritative Answers to the World’s Queries
- Anycast Agility: Network Playbooks to Fight DDoS
- A S M Rizvi, Leandro Bertholdo, João Ceron and John Heidemann. Proceedings of the 31st USENIX Security Symposium (Aug. 2022), 4201–4218.
- TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS
- Giovane C. M. Moura, Sebastian Castro, John Heidemann and Wes Hardaker. Proceedings of the ACM Internet Measurement Conference (Virtual, Nov. 2021), 398–418.
- DOI
- When the Dike Breaks: Dissecting DNS Defenses During DDoS
- Giovane C. M. Moura, John Heidemann, Moritz Müller, Ricardo de O. Schmidt and Marco Davids. Proceedings of the ACM Internet Measurement Conference (Oct. 2018).
- DOI
- Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks
- Harm Griffioen, Kris Oosthoek, Paul van der Knaap and Christian Doerr. ACM CCS 2021.
- DOI
- NTP Reflections
- January, 2014
- Blog
- On the Potential Abuse of IGMP
- Matthew Sargent, John Kristoff, Vern Paxson, Mark Allman. Computer Communications Review (CCR) ACM SIGCOMM, January 2017.