Booters—An analysis of DDoS-as-a-service attacks

JJ Santanna, R van Rijswijk-Deij… - 2015 IFIP/IEEE …, 2015 - ieeexplore.ieee.org
In 2012, the Dutch National Research and Education Network, SURFnet, observed a
multitude of Distributed Denial of Service (DDoS) attacks against educational institutions …

Characterizing eve: Analysing cybercrime actors in a large underground forum

S Pastrana, A Hutchings, A Caines… - Research in Attacks …, 2018 - Springer
Underground forums contain many thousands of active users, but the vast majority will be
involved, at most, in minor levels of deviance. The number who engage in serious criminal …

Exploring the provision of online booter services

A Hutchings, R Clayton - Deviant Behavior, 2016 - Taylor & Francis
This research uses differential association, techniques of neutralization, and rational choice
theory to study those who operate “booter services”: websites that illegally offer denial-of …

Reviewing estimates of cybercrime victimisation and cyber risk likelihood

DW Woods, L Walter - 2022 IEEE European Symposium on …, 2022 - ieeexplore.ieee.org
Across both the public and private sector, cyberse-curity decisions could be informed by
estimates of the likelihood of different types of exploitation and the corresponding harms …

DDoS never dies? An IXP perspective on DDoS amplification attacks

D Kopp, C Dietzel, O Hohlfeld - … Conference on Passive and Active Network …, 2021 - Springer
DDoS attacks remain a major security threat to the continuous operation of Internet edge
infrastructures, web services, and cloud platforms. While a large body of research focuses …

Ethical issues in research using datasets of illicit origin

DR Thomas, S Pastrana, A Hutchings… - Proceedings of the …, 2017 - dl.acm.org
We evaluate the use of data obtained by illicit means against a broad set of ethical and legal
issues. Our analysis covers both the direct collection, and secondary uses of, data obtained …

Scan, test, execute: Adversarial tactics in amplification DDoS attacks

H Griffioen, K Oosthoek, P van der Knaap… - Proceedings of the 2021 …, 2021 - dl.acm.org
Amplification attacks generate an enormous flood of unwanted traffic towards a victim and
are generated with the help of open, unsecured services, to which an adversary sends …

Booting the booters: Evaluating the effects of police interventions in the market for denial-of-service attacks

B Collier, DR Thomas, R Clayton… - Proceedings of the …, 2019 - dl.acm.org
Illegal booter services offer denial of service (DoS) attacks for a fee of a few tens of dollars a
month. Internationally, police have implemented a range of different types of intervention …

Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies

B Collier, R Clayton, A Hutchings, D Thomas - 2020 - repository.cam.ac.uk
It is generally accepted that the widespread availability of specialist services has helped
drive the growth of cybercrime in the past fifteen to twenty years. Individuals and groups …

DDoS hide & seek: on the effectiveness of a booter services takedown

D Kopp, M Wichtlhuber, I Poese, J Santanna… - Proceedings of the …, 2019 - dl.acm.org
Booter services continue to provide popular DDoS-as-a-service platforms and enable
anyone irrespective of their technical ability, to execute DDoS attacks with devastating …