Table of Contents
Worldwide Detection ofDenial of Service (DoS) Attacks
Outline
Key Idea
BackscatterAnalysis Technique
Backscatter Example:Responses Monitored
Backscatter analysis
Assumptions and biases
Identifying attacks
Results
Attack breakdown(three weeks in February)
Attacks over time
Attack characterization
Attack duration distribution
Attack rate distribution
Victim characterization
Victim breakdown by TLD
Distribution of repeat attacks
Validation
Conclusions
Cooperative Association for Internet Data Analysis (CAIDA)San Diego Supercomputer CenterComputer Science & EngineeringUniversity of California, San Diegohttp://www.caida.org/outreach/papers/backscatter/
Example 1:Periodic attack (1hr per 24hrs)
Example 2:Punctuated attack (1min interval)
Backscatter protocolbreakdown (one week)
Attack protocolbreakdown (one week)
|