Nothing Special   »   [go: up one dir, main page]

Skip to main content

Amplification DoS Attacks

  • Living reference work entry
  • First Online:
Encyclopedia of Cryptography, Security and Privacy

Synonyms

Reflection DoS attacks

Definitions

An amplification attack is a volumetric DoS attack with amplification and reflection characteristics. Reflection is achieved by source IP address spoofing, while amplification is accomplished by mostly exploiting UPD-based protocols that provide a much larger than the request response.

Theory and Application

The aim of an amplification DoS attack is to saturate the bandwidth of the victim with numerous and large in size packets. It targets mainly the network layer of TCP/IP protocol stack (Layer 3 of OSI model), but it can be used as an attack vector for all the above layers too depending on whether the victim hosts the same service as the protocol exploited for amplification. Overall, such an attack combines the characteristics of reflection and amplification (Ryba et al., 2015), namely, it induces the aggressive reply traffic stemming from tiny but legitimate requests initiated by the machines controlled by the aggressors to be redirected...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Anagnostopoulos M, Kambourakis G, Kopanos P, Louloudakis G, Gritzalis S (2013) DNS amplification attack revisited. Comput Secur 39(Part B):475–485

    Google Scholar 

  • Anagnostopoulos M, Kambourakis G, Gritzalis S, Yau DKY (2018) Never say never: authoritative TLD nameserver-powered DNS amplification. In: NOMS 2018 – 2018 IEEE/IFIP Network Operations and Management Symposium, pp 1–9. https://doi.org/10.1109/NOMS.2018.8406224

  • Ferguson P, Senie D (2000) RFC 2827: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. http://www.ietf.org/rfc/rfc2827.txt

  • Rossow C (2014) Amplification hell: revisiting network protocols for DDoS abuse. In: Proceedings of the 2014 Network and Distributed System Security Symposium (NDSS). https://www.ndss-symposium.org/ndss2014/

  • Ryba FJ, Orlinski M, Waehlisch M, Rossow C, Schmidt TC (2015) Amplification and DRDoS Attack Defense–A Survey and New Perspectives. arXiv preprint arXiv:150507892. http://arxiv.org/abs/1505.07892

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marios Anagnostopoulos .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Science+Business Media LLC

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Anagnostopoulos, M. (2021). Amplification DoS Attacks. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1486-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27739-9_1486-1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27739-9

  • Online ISBN: 978-3-642-27739-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics