Analysis of NTP DRDoS attacks’ performance effects and mitigation techniques

Loading...
Thumbnail Image
Other Title
Authors
Sarrafpour, Bahman
Abbaro, C.
Pitton, I.
Young, C.
Madipour, Farhad
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2016-12-14
Supervisors
Type
Conference Contribution - Oral Presentation
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
Distributed Denial of Service (DDoS)
network security
computer security
Network Time Protocol (NTP)
ANZSRC Field of Research Code (2020)
Citation
Sassani (Sarrafpour), B. A., Abbaro, C., Pitton, I., Young, C., & Mehdipour, F. (2016, December). Analysis of NTP DRDoS Attacks’ Performance Effects and Mitigation Techniques. Paper presented at 14th Privacy, Security, and Trust Annual Conference, Auckland, New Zealand.
Abstract
Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of Service (DDoS) attack which is a variant of DoS, but on a larger scale using previously compromised, malware infected computers known as “bots” or “zombies”. DDoS attack occurs by generating large amounts of traffic towards an intended victim. This paper focuses on analyzing a variant of DDoS attacks known as Network Time Protocol (NTP) Distributed Reflective Denial of Service (DRDoS) attack. The impact of the attack will be measured in the utilization of processor, memory, network and ping of most relevant devices. Further focus is on the host and network based layered “defense indepth” of NTP DRDoS attack mitigation techniques.
Publisher
Link to ePress publication
DOI
Copyright holder
Authors
Copyright notice
All rights reserved
Copyright license
Available online at
This item appears in: