Paper Abstract and Keywords |
Presentation |
2018-03-08 15:40
Analyzing Victims of DRDoS Attacks Observed by Honeypots Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-83 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
In recent years, Distributed Reflection Denial-of-Service (DRDoS) Attack are increasing. We have been observing DRDoS attacks using a decoy system called DRDoS honeypot. However, it is difficult to clarify what kind of organization is targeted with the information obtained from DRDoS honeypot. Therefore, in this paper, we first analyze the attacks in Japan observed by DRDoS honeypots using a passive DNS database. As a result, we confirm that 26 % of victim IP addresses are associated with Domain names when attacked. We also categorize target organizations based on the Domain names and analyze the trends and report the results along with concrete examples. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
/ / / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 117, no. 481, ICSS2017-83, pp. 205-210, March 2018. |
Paper # |
ICSS2017-83 |
Date of Issue |
2018-02-28 (ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ICSS2017-83 |
|