Главная
Study mode:
on
1
Introduction
2
What is amplification DDoS
3
Previous approaches
4
Scanning
5
Honeypot
6
Community Torics
7
Results
8
Trilateration
9
Time to Live
10
Problems
11
Experiments
12
Conclusion
Description:
Explore a conference talk that delves into the identification of scan and attack infrastructure behind amplification DDoS attacks. Learn about the authors' approach to understanding these cyber threats, including scanning techniques, honeypot usage, and community-based detection methods. Discover the challenges faced in tracking attack sources and the innovative solutions proposed, such as trilateration and Time to Live analysis. Gain insights into the experiments conducted and their implications for cybersecurity professionals and researchers working to combat amplification DDoS attacks.

Identifying the Scan and Attack Infrastructure Behind Amplification DDoS Attacks

Association for Computing Machinery (ACM)
Add to list