About: POSTER: Reflected attacks abusing honeypots     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
Description
  • We present the observation of distributed denial-of-service attacks that use reflection of the flooding traffic off reflectors. This type of attack was used in massive attacks against internet infrastructure of Czech Republic in March, 2013. Apart from common hosts in the network, honeypots were abused as the reflectors. It caused the false positive incident detection and helped attackers. Honeypots, which are by default set to accept any incoming network connection, unintentionally amplified the effect of reflection. We present an analysis of the attack from the point of view of honeypots and show the risks of having honeypots respond to any incoming traffic. We also discuss the possibilities of attack detection and mitigation and present lessons learned from handling the attack. We point out a lack of communication and data sharing during the observed attack.
  • We present the observation of distributed denial-of-service attacks that use reflection of the flooding traffic off reflectors. This type of attack was used in massive attacks against internet infrastructure of Czech Republic in March, 2013. Apart from common hosts in the network, honeypots were abused as the reflectors. It caused the false positive incident detection and helped attackers. Honeypots, which are by default set to accept any incoming network connection, unintentionally amplified the effect of reflection. We present an analysis of the attack from the point of view of honeypots and show the risks of having honeypots respond to any incoming traffic. We also discuss the possibilities of attack detection and mitigation and present lessons learned from handling the attack. We point out a lack of communication and data sharing during the observed attack. (en)
Title
  • POSTER: Reflected attacks abusing honeypots
  • POSTER: Reflected attacks abusing honeypots (en)
skos:prefLabel
  • POSTER: Reflected attacks abusing honeypots
  • POSTER: Reflected attacks abusing honeypots (en)
skos:notation
  • RIV/00216224:14610/13:00065737!RIV14-MV0-14610___
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • P(VG20132015103)
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 97692
http://linked.open...ai/riv/idVysledku
  • RIV/00216224:14610/13:00065737
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • communication; data sharing; ddos attack; honeypot; mitigation; reflection (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...ontrolniKodProRIV
  • [69353952C86D]
http://linked.open...v/mistoKonaniAkce
  • Berlin, Germany
http://linked.open...i/riv/mistoVydani
  • New York, NY, USA
http://linked.open...i/riv/nazevZdroje
  • Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...vavai/riv/projekt
http://linked.open...UplatneniVysledku
http://linked.open...iv/tvurceVysledku
  • Husák, Martin
  • Vizváry, Martin
http://linked.open...vavai/riv/typAkce
http://linked.open.../riv/zahajeniAkce
number of pages
http://bibframe.org/vocab/doi
  • 10.1145/2508859.2512523
http://purl.org/ne...btex#hasPublisher
  • ACM
https://schema.org/isbn
  • 9781450324779
http://localhost/t...ganizacniJednotka
  • 14610
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 15 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software