Analysis of NTP DRDoS attacks’ performance effects and mitigation techniques

Loading...
Thumbnail Image

Supplementary material

Other Title

Authors

Sarrafpour, Bahman
Abbaro, C.
Pitton, I.
Young, C.
Madipour, Farhad

Author ORCID Profiles (clickable)

Degree

Grantor

Date

2016-12-14

Supervisors

Type

Conference Contribution - Oral Presentation

Ngā Upoko Tukutuku (Māori subject headings)

Keyword

Distributed Denial of Service (DDoS)
network security
computer security
Network Time Protocol (NTP)

ANZSRC Field of Research Code (2020)

Citation

Sassani (Sarrafpour), B. A., Abbaro, C., Pitton, I., Young, C., & Mehdipour, F. (2016, December). Analysis of NTP DRDoS Attacks’ Performance Effects and Mitigation Techniques. Paper presented at 14th Privacy, Security, and Trust Annual Conference, Auckland, New Zealand.

Abstract

Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of Service (DDoS) attack which is a variant of DoS, but on a larger scale using previously compromised, malware infected computers known as “bots” or “zombies”. DDoS attack occurs by generating large amounts of traffic towards an intended victim. This paper focuses on analyzing a variant of DDoS attacks known as Network Time Protocol (NTP) Distributed Reflective Denial of Service (DRDoS) attack. The impact of the attack will be measured in the utilization of processor, memory, network and ping of most relevant devices. Further focus is on the host and network based layered “defense indepth” of NTP DRDoS attack mitigation techniques.

Publisher

Link to ePress publication

DOI

Copyright holder

Authors

Copyright notice

All rights reserved

Copyright license

Available online at

This item appears in: