{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:11:45Z","timestamp":1726053105090},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322571"},{"type":"electronic","value":"9783030322588"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_30","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:31:35Z","timestamp":1569922295000},"page":"255-265","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Note on Analysing the Attacker Aims Behind DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Abhishta","family":"Abhishta","sequence":"first","affiliation":[]},{"given":"Marianne","family":"Junger","sequence":"additional","affiliation":[]},{"given":"Reinoud","family":"Joosten","sequence":"additional","affiliation":[]},{"given":"Lambert J. M.","family":"Nieuwenhuis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"30_CR1","unstructured":"Anonymous attacks Italian government portals because of gas pipeline project (2016)"},{"key":"30_CR2","unstructured":"Anonymous takes down Nissan website in protest of Japanese whale killings (2016)"},{"key":"30_CR3","unstructured":"Australian 2016 census sabotage puts a question mark on private cloud (2016)"},{"key":"30_CR4","unstructured":"Battlefield 1 beta: You have lost connection to ea servers (2016)"},{"key":"30_CR5","unstructured":"Bitcoin exchange BTC-e resumes services after latest DDoS attack (2016)"},{"key":"30_CR6","unstructured":"Blizzard hit with another DDoS attack, overwatch, wow, hearthstone and more down (2016)"},{"key":"30_CR7","unstructured":"DDoS attacks caused StarHub broadband outages (2016)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"The DDoS vigilantes trying to silence black lives matter (2016)","DOI":"10.1215\/01636545-3594445"},{"key":"30_CR9","unstructured":"Donald Trump sweeping American polls, Canadian migration website down (2016)"},{"key":"30_CR10","unstructured":"Dyn statement on 10\/21\/2016 DDoS attack (2016)"},{"key":"30_CR11","unstructured":"Eir\u2019s webmail affected by DDoS attack (2016)"},{"key":"30_CR12","unstructured":"Ethereum\u2019s network is currently suffering from a computational DDoS attack (2016)"},{"key":"30_CR13","unstructured":"European commission hit by DDoS attack (2016)"},{"key":"30_CR14","unstructured":"Failed Mirai botnet attack downed 900000 Germans\u2019 internet access (2016)"},{"key":"30_CR15","unstructured":"Govt websites forced offline in DDoS attack (2016)"},{"key":"30_CR16","unstructured":"Hacker group anonymous shuts down KKK website (2016)"},{"key":"30_CR17","unstructured":"HSBC online banking is \u2018attacked\u2019 (2016)"},{"key":"30_CR18","unstructured":"Internet providers claim cyber attack, to meet senior cop (2016)"},{"key":"30_CR19","unstructured":"Irish lottery site and ticket machines hit by DDoS attack (2016)"},{"key":"30_CR20","unstructured":"KrebsOnSecurity hit with record DDoS (2016)"},{"key":"30_CR21","unstructured":"Pokemon go down: Hacking group claims credit for taking down servers \u2018with ddos attack\u2019 (2016)"},{"key":"30_CR22","unstructured":"Presidential candidate websites targeted (2016)"},{"key":"30_CR23","unstructured":"Steam connection servers down in probable DDoS attack (2016)"},{"key":"30_CR24","unstructured":"Tumblr goes down after hacker attack (2016)"},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"Web host hit by DDoS of over 1Tbps (2016)","DOI":"10.1016\/S1361-3723(16)30085-9"},{"key":"30_CR26","unstructured":"WikiLeaks comes under \u2018unrelenting\u2019 cyber attack that briefly prevents it from releasing more emails linked to Hillary Clinton on election day (2016)"},{"key":"30_CR27","unstructured":"William Hill website under siege from DDoS attacks (2016)"},{"key":"30_CR28","unstructured":"Abhishta, A., Joosten, R., Jonker, M., Kamerman, W., Nieuwenhuis, L.J.M.: Poster: collecting contextual information about a DDoS attack event using Google alerts (2019)"},{"key":"30_CR29","doi-asserted-by":"crossref","unstructured":"Anderson, R., Barton, C., Bohm, R., Clayton, R., Van Eeten, M.J.G., Levi, M., Moore, T., Savage, S.: Measuring the Cost of Cybercrime. In: Workshop on Economics of Information Security (2012)","DOI":"10.1007\/978-3-642-39498-0_12"},{"issue":"4","key":"30_CR30","doi-asserted-by":"publisher","first-page":"588","DOI":"10.2307\/2094589","volume":"44","author":"LE Cohen","year":"1979","unstructured":"Cohen, L.E., Felson, M.: Social change and crime rate trends: a routine activity approach. Am. Sociol. Rev. 44(4), 588\u2013608 (1979)","journal-title":"Am. Sociol. Rev."},{"key":"30_CR31","unstructured":"Cromwell, P., Olson, J.N.: The reasoning burglar: motives and decision-making strategies. In: In Their Own Words. Roxbury Publishing Company, Los Angeles (2006)"},{"issue":"1","key":"30_CR32","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MTS.2011.940293","volume":"30","author":"RA Gandhi","year":"2011","unstructured":"Gandhi, R.A., Sharma, A.C., Mahoney, W., Sousan, W., Zhu, Q.: Dimensions of cyber-attacks: cultural, social, economic, and political. IEEE Technol. Soc. Mag. 30(1), 28\u201338 (2011)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"30_CR33","unstructured":"Geers, K., Kindlund, D., Moran, N., Rachwald, R.: WORLD WAR C: understanding nation-state motives behind today\u2019s advanced cyber attacks (2013)"},{"key":"30_CR34","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"LA Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5, 438\u2013457 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"10","key":"30_CR35","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1080\/01639625.2016.1169829","volume":"37","author":"A Hutchings","year":"2016","unstructured":"Hutchings, A., Clayton, R.: Exploring the provision of online booter services. Deviant Behav. 37(10), 1163\u20131178 (2016)","journal-title":"Deviant Behav."},{"issue":"4\u20135","key":"30_CR36","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1017\/S0956792510000082","volume":"21","author":"SD Johnson","year":"2010","unstructured":"Johnson, S.D.: A brief history of the analysis of crime concentration. Eur. J. Appl. Math. 21(4\u20135), 349\u2013370 (2010)","journal-title":"Eur. J. Appl. Math."},{"key":"30_CR37","doi-asserted-by":"crossref","unstructured":"Kallus, N.: Predicting crowd behavior with big public data. In: Proceedings of the 23rd International Conference on World Wide Web, WWW 2014 Companion, pp. 625\u2013630. ACM, New York (2014)","DOI":"10.1145\/2567948.2579233"},{"key":"30_CR38","doi-asserted-by":"crossref","unstructured":"Kumar, S., Carley, K.M.: Understanding DDoS cyber-attacks using social media analytics. In: IEEE Conference on Intelligence and Security Informatics (ISI) (2016)","DOI":"10.1109\/ISI.2016.7745480"},{"issue":"3","key":"30_CR39","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1080\/01639625.2015.1012409","volume":"37","author":"ER Leukfeldt","year":"2016","unstructured":"Leukfeldt, E.R., Yar, M.: Applying routine activity theory to cybercrime: a theoretical and empirical analysis. Deviant Behav. 37(3), 263\u2013280 (2016)","journal-title":"Deviant Behav."},{"issue":"3","key":"30_CR40","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MITP.2009.46","volume":"11","author":"Simon Liu","year":"2009","unstructured":"Liu, S., Cheng, B.: Cyberattacks: why, what, who, and how. IT Prof. 11(3) (2009)","journal-title":"IT Professional"},{"key":"30_CR41","unstructured":"Nazario, J.: Politically motivated denial of service attacks. In: Cryptology and Information Security Series (2009)"},{"key":"30_CR42","unstructured":"Paulson, R.A., Weber, J.: Cyberextortion: an overview of distributed denial of service (2006)"},{"key":"30_CR43","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1177\/0002764213479370","volume":"57","author":"M Sauter","year":"2013","unstructured":"Sauter, M.: \u201cLOIC Will Tear Us Apart\u201d: the impact of tool design and media portrayals in the success of activist DDOS attacks. Am. Behav. Sci. 57, 983\u20131007 (2013)","journal-title":"Am. Behav. Sci."},{"key":"30_CR44","doi-asserted-by":"crossref","unstructured":"Sharma, A.C., Gandhi, R.A., Mahoney, W., Sousan, W., Zhu, Q., Laplante, P.: Building a social dimensional threat model from current and historic events of cyber attacks. In: IEEE Second International Conference on Social Computing (2010)","DOI":"10.1109\/SocialCom.2010.145"},{"issue":"4","key":"30_CR45","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1177\/147737080556056","volume":"2","author":"M Yar","year":"2005","unstructured":"Yar, M.: The novelty of cybercrime an assessment in light of routine activity theory. Eur. J. Criminol. 2(4), 407\u2013427 (2005)","journal-title":"Eur. J. Criminol."},{"key":"30_CR46","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15, 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T17:21:25Z","timestamp":1664558485000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_30","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}