DOI QR코드

DOI QR Code

Quantitative Approach for Calculating DRDoS Risk

  • Young-Ryul Choi (Department of IT Media Engineering, Duksung Women's University) ;
  • Nam-Kyun Baik (Department of IT Media Engineering, Duksung Women's University)
  • 투고 : 2023.05.31
  • 심사 : 2023.08.21
  • 발행 : 2023.09.30

초록

A Distributed reflection denial of service (DRDoS) is a variant of DDoS attacks that threatens the availability of services to legitimate users. In response to this evolving threat landscape, the cybersecurity industry and service providers have intensified their efforts to develop effective countermeasures. Despite these efforts, attackers continue to innovate, developing new strategies and tools while becoming more sophisticated. Consequently, DRDoS attacks continue to be harmful. Therefore, ongoing research and development is essential to improve defense against DRDoS attacks. To advance our understanding and analysis of DRDoS attacks, this study examines the unique characteristics of DRDoS attacks and quantifies the risks involved. Additionally, it adopts a quantitative rather than traditional qualitative methods to derive and apply risk, particularly the probability of loss that can be caused by DRDoS attacks.

키워드

참고문헌

  1. S. J. Choi and J. Kwak, "Enhanced server availability for DDoS amplification attack using CLDAP protocol," Korea Information Processing Society, vol. 7, no.1, pp. 19-26, Jan. 2018. DOI: 10.3745/KTCCS.2018.7.1.19.
  2. M. Kuhrer, T. Hupperich, C. Rossow, and T. Holz, "Exit from hell? Reducing the impact of amplification DDoS attacks," Open access to the Proceedings of the 23rd USENIX Security Symposium, San Diego, USA, pp. 111-125, 2014.
  3. Y. H. lee and J. H. lee, "Analysis of an association between CKC and CSC items in the cases of 7.7 and 3.4 DDoS," The Korea Society of Information Technology Policy & Management, vol. 14, no. 4, pp. 3059-3064, 2022.
  4. K. A. Kim. (2023, April 1) [2023 DDoS Response Report] Companies and institutions 'staggered' by DDoS funding bombardment. [Online] Available: https://www.boannews.com/media/view.asp?idx=115528.
  5. Y. A. Hur and K. H. Lee, "A Study on Countermeasures of Convergence for Big Data and Security Threats to Attack D0.RDoS in U-Healthcare Device," Journal of the Korea Convergence Society, vol. 6, no. 4, pp. 243-248, Aug. 2015. DOI: 10.15207/JKCS.2015.6.4.243.
  6. M. Kuhrer, T. Hupperich, C. Rossow, and T. Holz, "Hell of a handshake: Abusing TCP for reflective amplification DDoS attacks," USENIX Workshop on Offensive Technologies, 2014.
  7. K. T. Lee, S. S. Baek, and S. J. Kim, "Study on the near-real time DNS query analyzing system," Korea Institute Of Information Security And Cryptology, vol. 25, no. 2, pp. 303-311, Apr. 2015. DOI: 10.13089/JKIISC.2015.25.2.303.
  8. H. S. Choi and H. J. Lee. "A study on amplification DRDoS attacks and defenses," Journal of Korea institute of information, electronics, and communication technology, vol. 8, no. 5, pp. 429-437, Oct. 2015. DOI: 10.17661/jkiiect.2015.8.5.429.
  9. Korea Internet Security Agency. (2021, August) DDoS attack response guide. [Online] Available: https://www.krcert.or.kr/kr/bbs/view.do? bbsId=B 0000127&nttId=36186&menuNo=205021.
  10. Internet Protocol : RFC 791, (1981, Sep 1) [Online] Available: http://www.ietf.org/rfc/rfc791/.