Identification of repeated denial of service attacks
Denial of Service attacks have become a weapon for extortion and vandalism causing damages in the millions of dollars to commercial and government sites. Legal prosecution is a powerful deterrent, but requires attribution of attacks, currently a difficult task. In this paper we propose a method to automatically fingerprint and identify repeated attack scenarios - a combination of attacking hosts and attack tool. Such fingerprints not only aid in attribution for criminal and civil prosecution of attackers, but also help justify and focus response measures. Since packet contents can be easily manipulated, we base our fingerprints on the spectral characteristics of the attack stream which are hard to forge. We validate our methodology by applying it to real attacks captured at a regional ISP and comparing the outcome with header-based classification. Finally, we conduct controlled experiments to identify and isolate factors that affect the attack fingerprint. © 2006 IEEE.
Proceedings - IEEE INFOCOM
Hussain, A., Heidemann, J., & Papadopoulos, C. (2006). Identification of repeated denial of service attacks. Proceedings - IEEE INFOCOM https://doi.org/10.1109/INFOCOM.2006.126