Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.
Mizuki KondoRui TanabeNatsuo ShintaniDaisuke MakitaKatsunari YoshiokaTsutomu MatsumotoPublished in: DIMVA (2022)
Keyphrases
- countermeasures
- attack detection
- malicious users
- malicious attacks
- denial of service attacks
- ddos attacks
- fault injection
- differential power analysis
- attack scenarios
- dos attacks
- power analysis
- cyber attacks
- denial of service
- data corruption
- network attacks
- digital watermark
- network intrusion
- network intrusions
- injection attacks
- security risks
- block cipher
- defense mechanisms
- detecting malicious
- information security
- anomaly detection
- security measures
- intrusion detection system
- information leakage
- end hosts
- normal traffic
- intrusion detection
- smart card
- phishing attacks
- network anomaly detection
- watermarking scheme
- network intrusion detection
- malicious nodes
- malicious activities
- attack graphs
- java card
- security vulnerabilities
- detection mechanism
- buffer overflow
- detect malicious
- distributed denial of service attacks
- network security
- misuse detection
- malicious traffic
- normal behavior