SlideShare a Scribd company logo
The DDoS-as-a-Service Phenomenon
[Jair Santanna]
Design and Analysis of
Communication Systems
Less than 5 Dollars to attack everyone
Internet Management
and Measurement (IMM)
—
Denial of Service
"1 against 1"
Application layer
Infrastructure layer
Group of attacks
ApplicationInfrastructure
time
resourcescomputingpackets
X
XDifficult to Stop
Ease to Detect
Difficult to Detect
Ease to Stop
Type of Attacks
SYN
[Prolexic Global DDoS attack report]s
GET
SSL GET Slowloris
ICMP
ACK
IGMP
RIPUDP
UDP Fragmented
TCP Fragmented
HTTP Head
RESET
FIN
PUSH
POST SSL POST
DNS
NTP
SNMPv2
NetBIOS
SSDP
CharGEN
QOTD
BitTorrent Kad
Quake Network Protocol
Steam Protocol
Type of Attacks per Group
SYN
GET
SSL GET
SlowlorisICMP
ACK
IGMP
RIP
UDP
UDP Fragmented
TCP Fragmented
HTTP HeadRESET
FIN
PUSH
POST
SSL POSTDNS
NTP
SNMPv2 NetBIOS
SSDP
CharGEN
QOTD
BitTorrent
Kad
Quake Network Protocol
Steam Protocol
Applicationlayer
Infrastructurelayer
Type of Attacks per Group
SYN
GET
SSL GET
SlowlorisICMP
ACK
IGMP
RIP
UDP
UDP Fragmented
TCP Fragmented
HTTP HeadRESET
F
PUSH
POST
SSL POSTDNS
NTP
SNMPv2 NetBIOS
SSDP
CharGEN
QOTD
BitTorrent
Kad
Quake Network Protocol
Steam Protocol
Applicationlayer
Infrastructurelayer
Spoofed requestresponse
Reflection Attacks
DNS
NTP SNMPv2
NetBIOSSSDP CharGEN
QOTD
BitTorrentKad
Quake Network Protocol
Steam Protocol
normal situation
Denial of Service
"1 against 1"
Denial of ServiceDISTRIBUTED
"∞" against 1
- Services been misused
- Compromised systems
worse than
this!
*Amplification Factor
DNS
NTP SNMPv2
NetBIOSSSDP CharGEN
QOTD
BitTorrentKad
Quake Network Protocol
Steam Protocol
54x
556.9x
6.3x3.8x
30.8x
358.8x
140.3x
3.8x
16.3x
63.9x
5.5x
[Cert.us: TA14-017A]
maximun
2014-400Gbps
2020-
…2013-300Gbps
1TbpsRight?[link]
[link]
2013-300Gbps
2014-400Gbps
2020-1TbpsRight?
…
NO!2014
1Tbps OR higher
DNS
NTP
[or not]
[4,529]
[30,956]-> ~28 million
-> 94,534
IC measured 20 million
lets change a little bit
the topic...
Black-hat communities
are changing!
DDoS Attack
The DDoS-as-a-Service Phenomenon
Less than 5 Dollars to attack everyone
DDoS Attack
The DDoS-as-a-Service Phenomenon
Less than 5 Dollars to attack everyone
No more opponents!!
No more ONLINE exams!!
More attention to your presentation!!!
why not?
DDoS Attack
The DDoS-as-a-Service Phenomenon
Less than 5 Dollars to attack everyone
Economic Impact!!
Booters
Online Tools that offer DDoS-as-a-$ervice.
~U$ 5
"Booter"
"Stresser"
"DDoSer"
"DDoS-as-a Service"
"DDoS-for-hire"
Front-end
Customer Booter Target
Back-end
DNS Server
charGEN Server
Bot (from botnet)
How Booters work?
Characterise and Mitigate
The DDoS-as-a-Service Phenomenon
MeasurementsCrawler & Classifier
Measurements
Survey
Measurements
My goal as a Ph.D:
Measurements
active passive
packet flowscans raw
Some Results...
59 Booters listed since July 2013
[Crawler]
14 Booters hired and tested
# DDoS as a $ervice
Offer
[Gbps]
1 http://booter.tw ?
2 http://restricted-stresser.info 5
3 http://anonymous-stresser.net 5
4 http://destressbooter.com 25
5 http://flashstresser.net ?
6 http://dejabooter.com 10
7 http://rebel-security.com Up to 3
8 http://grimboot.com 6
9 http://quantumbooter.net 1,5
10 http://olympusstresser.org Up to 3
11 http://ebooter.5gbfree.com ?
12 http://vdoss.net ?
13 http://respawn.ca 8
14 http://onionstresser.com ?
price
[€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
€58,35
14 Booters hired and tested
http://respawn.ca http://onionstresser.com
14 Booters hired and tested
3 1
93.174.93.114:80
NL-ECATEL
Netherlands, Europe
http://olympusstresser.org http://vdoss.net http://ebooter.5gbfree.com
1 190.231.55.202:5900 ->VNC
Apolo -Gold-Telecom-Per
Telecom Argentina S.A.
14 Booters hired and tested
# DDoS as a $ervice
Offer
[Gbps]
1 http://booter.tw ?
2 http://restricted-stresser.info 5
3 http://anonymous-stresser.net 5
4 http://destressbooter.com 25
5 http://flashstresser.net ?
6 http://dejabooter.com 10
7 http://rebel-security.com Up to 3
8 http://grimboot.com 6
9 http://quantumbooter.net 1,5
10 http://olympusstresser.org Up to 3
11 http://ebooter.5gbfree.com ?
12 http://vdoss.net ?
13 http://respawn.ca 8
14 http://onionstresser.com ?
UT
[Gbps]
0,07
1,22
0,38
0,72
3,0
1,1
1,0
0,37
0,37
SURFnet
[Gbps]
0,112
1,952
0,608
1,152
4,8
1,76
1,6
0,592
0,592
IPs involved
*
8,28
7,369
6,075
4,486
3,779
2,97
281
78
54
Attacks
based on
*DNS
*DNS
*DNS
*DNS
*Chargen
*DNS
*Chargen
*DNS
*DNS
price
[€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
€58,35
33.372
14 Booters hired and tested
8280
http://booter.tw http://restricted-stresser.info
7369
http://anonymous-stresser.net
6075
http://destressbooter.com
4486
http://flashstresser.net
3779
http://dejabooter.com
2970
http://rebel-security.com
281
http://grimboot.com
78
http://quantumbooter.net
*54
98%
Cheaper and more Powerful
http://booter.tw http://restricted-stresser.info http://anonymous-stresser.net
http://destressbooter.com http://flashstresser.net http://dejabooter.com
http://rebel-security.com http://grimboot.com http://quantumbooter.net
**Traffic[bytes]pertime[s]
http://booter.tw http://restricted-stresser.info http://anonymous-stresser.net
http://destressbooter.com http://flashstresser.net http://dejabooter.com
http://rebel-security.com http://grimboot.com http://quantumbooter.net
**#PacketssendperIP
Current Step...
Current Step...
Crawler & Classifier
Measurements
Survey
Popularity and Characteristics of Booters
Thanks for your attention!

More Related Content

What's hot

A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
IJNSA Journal
 
Rsa2016
Rsa2016Rsa2016
Rsa2016
F _
 
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
journalBEEI
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
Qrator Labs
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
IJNSA Journal
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
Haltdos
 
Penetration testing is a field which has experienced rapid growth over the years
Penetration testing is a field which has experienced rapid growth over the yearsPenetration testing is a field which has experienced rapid growth over the years
Penetration testing is a field which has experienced rapid growth over the yearsGregory Hanis
 
2016 payment threats trends report
2016 payment threats trends report2016 payment threats trends report
2016 payment threats trends report
Ian Beckett
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
IRJET Journal
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016
Andrey Apuhtin
 
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyDDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
Stephanie Weagle
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationAn Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
TechApprise
 
Web Applications Under Siege: Defending Against Attack Outbreaks
Web Applications Under Siege: Defending Against Attack OutbreaksWeb Applications Under Siege: Defending Against Attack Outbreaks
Web Applications Under Siege: Defending Against Attack Outbreaks
Imperva
 
A041201010
A041201010A041201010
A041201010
ijceronline
 

What's hot (17)

A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
50120140502001 2
50120140502001 250120140502001 2
50120140502001 2
 
Rsa2016
Rsa2016Rsa2016
Rsa2016
 
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
 
Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
 
Penetration testing is a field which has experienced rapid growth over the years
Penetration testing is a field which has experienced rapid growth over the yearsPenetration testing is a field which has experienced rapid growth over the years
Penetration testing is a field which has experienced rapid growth over the years
 
2016 payment threats trends report
2016 payment threats trends report2016 payment threats trends report
2016 payment threats trends report
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016
 
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyDDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationAn Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
 
Web Applications Under Siege: Defending Against Attack Outbreaks
Web Applications Under Siege: Defending Against Attack OutbreaksWeb Applications Under Siege: Defending Against Attack Outbreaks
Web Applications Under Siege: Defending Against Attack Outbreaks
 
A041201010
A041201010A041201010
A041201010
 

Viewers also liked

Telenet anti ddos - Security event juni 2016
Telenet anti ddos - Security event juni 2016Telenet anti ddos - Security event juni 2016
Telenet anti ddos - Security event juni 2016
Marketing Team
 
Gemalto ключевой компонент безопасной инфраструктуры microsoft 05122014
Gemalto  ключевой компонент безопасной инфраструктуры microsoft 05122014Gemalto  ключевой компонент безопасной инфраструктуры microsoft 05122014
Gemalto ключевой компонент безопасной инфраструктуры microsoft 05122014
ISSP Russia
 
Analyzing the State of the Internet
Analyzing the State of the InternetAnalyzing the State of the Internet
Analyzing the State of the Internet
David Belson
 
Custom branding: Powered by Incapsula
Custom branding: Powered by IncapsulaCustom branding: Powered by Incapsula
Custom branding: Powered by Incapsula
Imperva Incapsula
 
Business+ DDoS Protection
Business+ DDoS ProtectionBusiness+ DDoS Protection
Business+ DDoS Protection
Imperva Incapsula
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
Imperva Incapsula
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutions
Frank Victory
 
Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Waheb Samaraie
 

Viewers also liked (8)

Telenet anti ddos - Security event juni 2016
Telenet anti ddos - Security event juni 2016Telenet anti ddos - Security event juni 2016
Telenet anti ddos - Security event juni 2016
 
Gemalto ключевой компонент безопасной инфраструктуры microsoft 05122014
Gemalto  ключевой компонент безопасной инфраструктуры microsoft 05122014Gemalto  ключевой компонент безопасной инфраструктуры microsoft 05122014
Gemalto ключевой компонент безопасной инфраструктуры microsoft 05122014
 
Analyzing the State of the Internet
Analyzing the State of the InternetAnalyzing the State of the Internet
Analyzing the State of the Internet
 
Custom branding: Powered by Incapsula
Custom branding: Powered by IncapsulaCustom branding: Powered by Incapsula
Custom branding: Powered by Incapsula
 
Business+ DDoS Protection
Business+ DDoS ProtectionBusiness+ DDoS Protection
Business+ DDoS Protection
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutions
 
Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)
 

Similar to 20140313_tu_delft

20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna
University of Twente
 
20150909_network_security_lecture
20150909_network_security_lecture20150909_network_security_lecture
20150909_network_security_lecture
University of Twente
 
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
allanjude
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
Imperva Incapsula
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
Infradata
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 
20150909_cybercrime_cybersecurity_minor
20150909_cybercrime_cybersecurity_minor20150909_cybercrime_cybersecurity_minor
20150909_cybercrime_cybersecurity_minor
University of Twente
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
Sukbum Hong
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
Cloudflare
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
Amazon Web Services
 
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetupWeapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
michaelxin2015
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PROIDEA
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
Guardicore
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
Radware
 
Securing your web infrastructure
Securing your web infrastructureSecuring your web infrastructure
Securing your web infrastructure
WP Engine
 
Universal DDoS Mitigation Bypass
Universal DDoS Mitigation BypassUniversal DDoS Mitigation Bypass
Universal DDoS Mitigation Bypass
Albert Hui
 
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
Amazon Web Services
 
Why Protection From DDoS Attacks is Critical For Your Business
Why Protection From DDoS Attacks is Critical For Your BusinessWhy Protection From DDoS Attacks is Critical For Your Business
Why Protection From DDoS Attacks is Critical For Your Business
WP Engine
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
Marta Pacyga
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PROIDEA
 

Similar to 20140313_tu_delft (20)

20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna
 
20150909_network_security_lecture
20150909_network_security_lecture20150909_network_security_lecture
20150909_network_security_lecture
 
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
20150909_cybercrime_cybersecurity_minor
20150909_cybercrime_cybersecurity_minor20150909_cybercrime_cybersecurity_minor
20150909_cybercrime_cybersecurity_minor
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetupWeapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
Securing your web infrastructure
Securing your web infrastructureSecuring your web infrastructure
Securing your web infrastructure
 
Universal DDoS Mitigation Bypass
Universal DDoS Mitigation BypassUniversal DDoS Mitigation Bypass
Universal DDoS Mitigation Bypass
 
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
 
Why Protection From DDoS Attacks is Critical For Your Business
Why Protection From DDoS Attacks is Critical For Your BusinessWhy Protection From DDoS Attacks is Critical For Your Business
Why Protection From DDoS Attacks is Critical For Your Business
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 

More from University of Twente

DDoS attacks, Booters, and DDoSDB
DDoS attacks, Booters, and DDoSDBDDoS attacks, Booters, and DDoSDB
DDoS attacks, Booters, and DDoSDB
University of Twente
 
20170406 delft
20170406 delft20170406 delft
20170406 delft
University of Twente
 
Meeting Towards Collaboration for DDoS Attack Mitigation
Meeting Towards Collaboration for DDoS Attack MitigationMeeting Towards Collaboration for DDoS Attack Mitigation
Meeting Towards Collaboration for DDoS Attack Mitigation
University of Twente
 
DDoS attacks and Booters -- *my thesis summary
DDoS attacks and Booters -- *my thesis summaryDDoS attacks and Booters -- *my thesis summary
DDoS attacks and Booters -- *my thesis summary
University of Twente
 
Booter Blacklist: Unveiling DDoS-for-hire Websites
Booter Blacklist: Unveiling DDoS-for-hire WebsitesBooter Blacklist: Unveiling DDoS-for-hire Websites
Booter Blacklist: Unveiling DDoS-for-hire Websites
University of Twente
 
Inter-actief presentation
Inter-actief presentationInter-actief presentation
Inter-actief presentation
University of Twente
 
Civil Disobedience, DDoS attacks, Booters, and Beyond!
Civil Disobedience, DDoS attacks, Booters, and Beyond! Civil Disobedience, DDoS attacks, Booters, and Beyond!
Civil Disobedience, DDoS attacks, Booters, and Beyond!
University of Twente
 
20160816 amlight popbahia_rnp_ansp
20160816 amlight popbahia_rnp_ansp20160816 amlight popbahia_rnp_ansp
20160816 amlight popbahia_rnp_ansp
University of Twente
 
20160613 TNC TERENA
20160613 TNC TERENA20160613 TNC TERENA
20160613 TNC TERENA
University of Twente
 
20160416_de-cix
20160416_de-cix20160416_de-cix
20160416_de-cix
University of Twente
 
20160416_flamingo
20160416_flamingo20160416_flamingo
20160416_flamingo
University of Twente
 

More from University of Twente (11)

DDoS attacks, Booters, and DDoSDB
DDoS attacks, Booters, and DDoSDBDDoS attacks, Booters, and DDoSDB
DDoS attacks, Booters, and DDoSDB
 
20170406 delft
20170406 delft20170406 delft
20170406 delft
 
Meeting Towards Collaboration for DDoS Attack Mitigation
Meeting Towards Collaboration for DDoS Attack MitigationMeeting Towards Collaboration for DDoS Attack Mitigation
Meeting Towards Collaboration for DDoS Attack Mitigation
 
DDoS attacks and Booters -- *my thesis summary
DDoS attacks and Booters -- *my thesis summaryDDoS attacks and Booters -- *my thesis summary
DDoS attacks and Booters -- *my thesis summary
 
Booter Blacklist: Unveiling DDoS-for-hire Websites
Booter Blacklist: Unveiling DDoS-for-hire WebsitesBooter Blacklist: Unveiling DDoS-for-hire Websites
Booter Blacklist: Unveiling DDoS-for-hire Websites
 
Inter-actief presentation
Inter-actief presentationInter-actief presentation
Inter-actief presentation
 
Civil Disobedience, DDoS attacks, Booters, and Beyond!
Civil Disobedience, DDoS attacks, Booters, and Beyond! Civil Disobedience, DDoS attacks, Booters, and Beyond!
Civil Disobedience, DDoS attacks, Booters, and Beyond!
 
20160816 amlight popbahia_rnp_ansp
20160816 amlight popbahia_rnp_ansp20160816 amlight popbahia_rnp_ansp
20160816 amlight popbahia_rnp_ansp
 
20160613 TNC TERENA
20160613 TNC TERENA20160613 TNC TERENA
20160613 TNC TERENA
 
20160416_de-cix
20160416_de-cix20160416_de-cix
20160416_de-cix
 
20160416_flamingo
20160416_flamingo20160416_flamingo
20160416_flamingo
 

Recently uploaded

Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 

Recently uploaded (16)

Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 

20140313_tu_delft