Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Overview
  • Workshop Organizers
  • Registration Information
  • Registration Discounts
  • At a Glance
  • Calendar
  • Workshop Program
  • Birds-of-a-Feather Sessions
  • Co-located Workshops
  • Sponsorship
  • Activities
  • Hotel and Travel Information
  • Students
  • Questions
  • Help Promote!
  • For Participants
  • Call for Papers
  • Past Workshops

sponsors

Bronze Sponsor

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป Understanding the Emerging Threat of DDoS-as-a-Service
Tweet

connect with us

https://twitter.com/usenixsecurity
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Understanding the Emerging Threat of DDoS-as-a-Service

Authors: 

Mohammad Karami and Damon McCoy, George Mason University

Abstract: 

A denial-of-service (DoS) attack refers to an explicit attempt by a malicious party to deny legitimate users of a service from accessing the service. A distributed denial-of-service (DDoS) attack has the exact same goal but multiple distributed resources are utilized for a more devastating effect.

While access to a large number of compromised hosts was traditionally required for launching successful DDoS attacks, the emergence of DDoS-As-a-Service in recent years have made DDoS infrastructure capable of generating over 800 MBit/s of traffic accessible to a wide range of malicious actors for a cost as low as $10/month.

In this paper, we investigate the phenomenon of low-cost DDoS-As-a-Service also known as Booter services. While we are aware of the existence of the underground economy of Booters, we do not have much insight into their internal operations, including the users of such services, the usage patterns, the attack infrastructure, and the victims. In this paper, we present a brief analysis on the operations of a Booter known as TwBooter based on a publicly-leaked dump of their operational database. This data includes the attack infrastructure used for mounting attacks, details on service subscribers, and the targets of attacks. Our analysis reveals that this service earned over $7,500 a month and was used to launch over 48,000 DDoS attacks against 11,000 distinct victims including government websites and news sites in less than two months of operation.

Mohammad Karami, George Mason University

Damon McCoy, George Mason University

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@inproceedings {179241,
author = {Mohammad Karami and Damon McCoy},
title = {Understanding the Emerging Threat of {DDoS-as-a-Service}},
booktitle = {6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13)},
year = {2013},
address = {Washington, D.C.},
url = {https://www.usenix.org/conference/leet13/workshop-program/presentation/karami},
publisher = {USENIX Association},
month = aug,
}
Download
Karami PDF
View the slides

Presentation Audio

MP3 Download OGG Download

Download Audio

  • Log in or    Register to post comments

Bronze Sponsors

© USENIX

  • Privacy Policy
  • Contact Us