%0 Conference Proceedings %T Amplification DDoS Attacks: Emerging Threats and Defense Strategies %+ Italian Atlantic Committee %+ Università degli Studi di Milano = University of Milan (UNIMI) %A Colella, Antonio %A Colombini, Clara, Maria %Z Part 2: 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014) %< avec comité de lecture %( Lecture Notes in Computer Science %B International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES) %C Fribourg, Switzerland %Y Stephanie Teufel %Y Tjoa A Min %Y Ilsun You %Y Edgar Weippl %I Springer %3 Availability, Reliability, and Security in Information Systems %V LNCS-8708 %P 298-310 %8 2014-09-08 %D 2014 %R 10.1007/978-3-319-10975-6_24 %K DDoS Attack %K Amplification of DDoS Attacks %K DNS %K Digital Profiling %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X There are too many servers on the Internet that have already been used, or that are vulnerable and can potentially be used to launch DDoS attacks. Even though awareness increases and organizations begin to lock down those systems, there are plenty of other protocols that can be exploited to be used instead of them. One example is the Simple Network Management Protocol (SNMP), which is a common UDP protocol used for network management. Several types of network devices actually come with SNMP ”on” by default. A request sent to an SNMP server returns a response that is larger than the query that came in.The main aim of this paper is to investigate on the increasing prevalence and destructive power of amplification-based distributed denial of service (DDoS) attacks in order to present a solution based on a profiling methodology. The paper encompass three aspects: amplification DDoS attacks and main port used, the profiling methodology as a mean of identifying the threat and shape it. Finally, a proposal solution is given by considering both strategic and technical aspects. %G English %Z TC 5 %Z TC 8 %Z WG 8.4 %Z WG 8.9 %2 https://inria.hal.science/hal-01404010/document %2 https://inria.hal.science/hal-01404010/file/978-3-319-10975-6_24_Chapter.pdf %L hal-01404010 %U https://inria.hal.science/hal-01404010 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-LNCS-8708 %~ IFIP-CD-ARES %~ IFIP-WG8-4 %~ IFIP-WG8-9