Estonian DDoS Attack 2007
Contents |
Reports
[iDefense Security Report .]
Craig Partridge, Paul Barford, David D. Clark, Sean Donelan, Vern Paxon, Jennifer Rexford, and Mary K. Vernon,
iDefense predicts that the number of fi nancially motivated cyber criminals will grow.,
The iDefense® Intelligence Team, Originally Published: July 12, 2007, Revised: July 11, 2008,
ResiliNets Keywords: DDoS attacks, Motivation, examples
Abstract: “A distributed denial of service (DDoS) attack aims to intentionally deprive legitimate users of a resource (or service) provided by a system, typically by overloading that system with a fl ood of data packets from multiple sources. Attackers normally create a denial of service (DoS) condition by either breaking down the communication channel to the server (by consuming server bandwidth), or by bringing down the server completely or impairing its effi ciency considerably. This can be accomplished by exploiting a vulnerability in the server or by consuming server resources (e.g., memory, hard disk, etc.). ”
Papers
[Mirkovic-Reiher-2004 (doi) .]
Mirkovic, Jelena and Reiher, Peter,
A taxonomy of DDoS attack and DDoS defense mechanisms,
SIGCOMM Comput. Commun. Rev.,
Abstract: “Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem and the current solution space. The attack classification criteria was selected to highlight commonalities and important features of attack strategies, that define challenges and dictate the design of countermeasures. The defense taxonomy classifies the body of existing DDoS defenses based on their design decisions; it then shows how these decisions dictate the advantages and deficiencies of proposed solutions.”
ResiliNets Keywords: Taxonomy, DDoS attacks, DDoS defense
[Lesk-Stytz-Trope-2007 (doi) .]
Michael Lesk, Martin R. Stytz and Roland L. Trope,
The New Front Line-Estonia under Cyberassault,
[Security & Privacy, IEEE]
Abstract: “Estonia, although small is a remarkably Web-dependent country, with widespread Internet access, digital identity cards, an 80-percent usage rate for online banking, electronic tax collection, and remote medical monitoring. The DDoS attacks began on the foreign minister's Web site, but spread to all government institutions and key businesses, such as banks. On balance, the Estonian cyberwar ought to be a wake up call. Producing so much disruption for so little money has to be attractive to many groups. We know that people with evil intentions watched what happened; we can only hope that people with good intentions watched as well.”
ResiliNets Keywords: Estonia, DDoS attacks, DDoS defense
Presentations
[Brown-Zmijewski-2002 .]
Martin Brown and Earl Zmijewski,
“How to SYN-flood DOS yourself while annoying everyone on the planet;,
APRICOT Taipei,
Renesys, 2008,
available from
http://www.renesys.com/tech/presentations/pdf/apricot-lightning-08.pdf
ResiliNets Keywords: DDoS yourself, Pakistan Telecom, YouTube