Poster : The Curious Case of NTP Monlist Teemu Rytilahti

semanticscholar(2016)

引用 1|浏览0
暂无评分
摘要
While not a new threat, reflective amplification DDoS attacks exploiting vulnerable network services are still very prevalent despite the ongoing efforts to get them fixed. In this paper, we demonstrate how the very same feature used for NTP-based attacks can be used to form a global picture of ongoing attacks on the Internet. To this end, we first scanned the Internet to find vulnerable NTP servers, and subsequently requested their client lists hourly for a week. Our initial results suggest that only a fraction of all vulnerable services are currently suitable for attacks as well as for attack tracking. Furthermore, we show that there are many known vulnerable hosts which have remained unused due to their small response sizes, and argue that they may be abused for future attacks.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要