SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots
Research output: Contribution to book/Conference proceedings/Anthology/Report › Conference contribution › Contributed › peer-review
Contributors
Abstract
In this paper, we revisit the use of honeypots for detecting reflective amplification attacks. These measurement tools require careful design of both data collection and data analysis including cautious threshold inference. We survey common amplification honeypot platforms as well as the underlying methods to infer attack detection thresholds and to extract knowledge from the data. By systematically exploring the threshold space, we find most honeypot platforms produce comparable results despite their different configurations. Moreover, by applying data from a large-scale honeypot deployment, network telescopes, and a real-world baseline obtained from a leading DDoS mitigation provider, we question the fundamental assumption of honeypot research that convergence of observations can imply their completeness. Conclusively we derive guidance on precise, reproducible honeypot research, and present open challenges.
Details
Original language | English |
---|---|
Title of host publication | Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023 |
Publisher | IEEE |
Pages | 576-591 |
Number of pages | 16 |
ISBN (electronic) | 9781665465120 |
Publication status | Published - Jul 2023 |
Peer-reviewed | Yes |
External IDs
Scopus | 85168159713 |
---|---|
ORCID | /0000-0002-3825-2807/work/142241908 |
Mendeley | d251d94f-59ad-3790-b90c-696700c1c85e |
Keywords
Research priority areas of TU Dresden
DFG Classification of Subject Areas according to Review Boards
Subject groups, research areas, subject areas according to Destatis
Sustainable Development Goals
ASJC Scopus subject areas
Keywords
- Amplification Attacks, DDoS, Honeypot, Sys-temization of Knowledge