{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:31:31Z","timestamp":1769916691987,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["6KIS0975K,16KIS0976"],"award-info":[{"award-number":["6KIS0975K,16KIS0976"]}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["830927"],"award-info":[{"award-number":["830927"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SIDN fonds","award":["174058"],"award-info":[{"award-number":["174058"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3355369.3355590","type":"proceedings-article","created":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T12:57:15Z","timestamp":1571403435000},"page":"65-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["DDoS Hide &amp; Seek"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Kopp","sequence":"first","affiliation":[{"name":"DE-CIX"}]},{"given":"Matthias","family":"Wichtlhuber","sequence":"additional","affiliation":[{"name":"DE-CIX"}]},{"given":"Ingmar","family":"Poese","sequence":"additional","affiliation":[{"name":"BENOCS"}]},{"given":"Jair","family":"Santanna","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Oliver","family":"Hohlfeld","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology"}]},{"given":"Christoph","family":"Dietzel","sequence":"additional","affiliation":[{"name":"DE-CIX \/ MPI for Informatics"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"State of the Internet Security Report (Q4","author":"Akamai","year":"2017","unstructured":"Akamai . State of the Internet Security Report (Q4 2017 ). https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/q4-2017-state-of-the-internet-security-report.pdf, 2017. Akamai. State of the Internet Security Report (Q4 2017). https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/q4-2017-state-of-the-internet-security-report.pdf, 2017."},{"key":"e_1_3_2_1_2_1","volume-title":"State of the Internet Security Report (Attack Spotlight: Memcached). https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/soti-summer-2018-attack-spotlight.pdf","author":"Akamai","year":"2018","unstructured":"Akamai . State of the Internet Security Report (Attack Spotlight: Memcached). https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/soti-summer-2018-attack-spotlight.pdf , 2018 . Akamai. State of the Internet Security Report (Attack Spotlight: Memcached). https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/soti-summer-2018-attack-spotlight.pdf, 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"Understanding the Mirai Botnet. USENIX Security Symposium","author":"Antonakakis M.","year":"2017","unstructured":"Antonakakis , M. , April , T. , Bailey , M. , Bernhard , M. , Bursztein , E. , Cochran , J. , Durumeric , Z. , Halderman , J. A. , Invernizzi , L. , Kallitsis , M. , Kumar , D. , Lever , C. , Ma , Z. , Mason , J. , Menscher , D. , Seaman , C. , Sullivan , N. , Thomas , K. , and Zhou , Y . Understanding the Mirai Botnet. USENIX Security Symposium ( 2017 ). Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J. A., Invernizzi, L., Kallitsis, M., Kumar, D., Lever, C., Ma, Z., Mason, J., Menscher, D., Seaman, C., Sullivan, N., Thomas, K., and Zhou, Y. Understanding the Mirai Botnet. USENIX Security Symposium (2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"BBC. 'Hacking attacks' hit Russian political sites. http:\/\/www.bbc.com\/news\/technology-16032402 2012.  BBC. 'Hacking attacks' hit Russian political sites. http:\/\/www.bbc.com\/news\/technology-16032402 2012."},{"key":"e_1_3_2_1_5_1","volume-title":"SRUTI'05","author":"Beverly R.","year":"2005","unstructured":"Beverly , R. , and Bauer , S . The spoofer project: Inferring the extent of internet source address filtering on the internet. In Steps to Reducing Unwanted Traffic on the Internet Workshop , SRUTI'05 , Cambridge, MA, USA , July 7, 2005 (2005). Beverly, R., and Bauer, S. The spoofer project: Inferring the extent of internet source address filtering on the internet. In Steps to Reducing Unwanted Traffic on the Internet Workshop, SRUTI'05, Cambridge, MA, USA, July 7, 2005 (2005)."},{"key":"e_1_3_2_1_6_1","volume-title":"Understanding the Efficacy of Deployed Internet Source Address Validation Filtering. In Internet Measurement Conference (IMC) (Nov","author":"Beverly R.","year":"2009","unstructured":"Beverly , R. , Berger , A. , Hyun , Y. , and claffy, k. Understanding the Efficacy of Deployed Internet Source Address Validation Filtering. In Internet Measurement Conference (IMC) (Nov 2009 ). Beverly, R., Berger, A., Hyun, Y., and claffy, k. Understanding the Efficacy of Deployed Internet Source Address Validation Filtering. In Internet Measurement Conference (IMC) (Nov 2009)."},{"key":"e_1_3_2_1_7_1","volume-title":"Workshop on the Economics of Information Security","author":"Brunt R.","year":"2017","unstructured":"Brunt , R. , Pandey , P. , and McCoy , D. Booted : An analysis of a payment intervention on a DDoS-for-Hire-Service . In Workshop on the Economics of Information Security ( 2017 ). Brunt, R., Pandey, P., and McCoy, D. Booted: An analysis of a payment intervention on a DDoS-for-Hire-Service. In Workshop on the Economics of Information Security (2017)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25645-0_9"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Workshop on Large-Scale Exploits and Emergent Threats","author":"B\u00fcscher A.","year":"2012","unstructured":"B\u00fcscher , A. , and Holz , T . Tracking DDoS Attacks: Insights into the Business of Disrupting the Web . In USENIX Workshop on Large-Scale Exploits and Emergent Threats ( 2012 ). B\u00fcscher, A., and Holz, T. Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (2012)."},{"key":"e_1_3_2_1_10_1","volume-title":"IFIP\/IEEE International Symposium on Integrated Network Management","author":"Cardoso de Santanna J.","year":"2015","unstructured":"Cardoso de Santanna , J. , Durban , R. , Sperotto , A. , and Pras , A . Inside Booters: an analysis on operational databases . In IFIP\/IEEE International Symposium on Integrated Network Management ( 2015 ). Cardoso de Santanna, J., Durban, R., Sperotto, A., and Pras, A. Inside Booters: an analysis on operational databases. In IFIP\/IEEE International Symposium on Integrated Network Management (2015)."},{"key":"e_1_3_2_1_11_1","volume-title":"AIMS","author":"Cardoso de Santanna J.","year":"2014","unstructured":"Cardoso de Santanna , J. , and Sperotto , A . Characterizing and Mitigating the DDoS-as-a-Service Phenomenon . In AIMS ( 2014 ). Cardoso de Santanna, J., and Sperotto, A. Characterizing and Mitigating the DDoS-as-a-Service Phenomenon. In AIMS (2014)."},{"key":"e_1_3_2_1_12_1","volume-title":"Brazilian Symposium on Computer Networks and Distributed Systems","author":"Chromik J.","year":"2015","unstructured":"Chromik , J. , Cardoso de Santanna , J. , Sperotto , A. , and Pras , A . Booter websites characterization: Towards a list of threats . In Brazilian Symposium on Computer Networks and Distributed Systems ( 2015 ). Chromik, J., Cardoso de Santanna, J., Sperotto, A., and Pras, A. Booter websites characterization: Towards a list of threats. In Brazilian Symposium on Computer Networks and Distributed Systems (2015)."},{"key":"e_1_3_2_1_13_1","volume-title":"IMC","author":"Collier B.","year":"2019","unstructured":"Collier , B. , Thomas , D. R. , Clayton , R. , and Hutchings , A . Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks . In IMC ( 2019 ). Collier, B., Thomas, D. R., Clayton, R., and Hutchings, A. Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks. In IMC (2019)."},{"key":"e_1_3_2_1_14_1","volume-title":"ACM IMC","author":"Czyz J.","year":"2014","unstructured":"Czyz , J. , Kallitsis , M. , Gharaibeh , M. , Papadopoulos , C. , Bailey , M. , and Karir , M . Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks . In ACM IMC ( 2014 ). Czyz, J., Kallitsis, M., Gharaibeh, M., Papadopoulos, C., Bailey, M., and Karir, M. Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks. In ACM IMC (2014)."},{"key":"e_1_3_2_1_15_1","volume-title":"The DoS Project's 'trinoo' distributed denial of service attack tool. https:\/\/staff.washington.edu\/dittrich\/misc\/trinoo.analysis","author":"Dittrich D.","year":"1999","unstructured":"Dittrich , D. The DoS Project's 'trinoo' distributed denial of service attack tool. https:\/\/staff.washington.edu\/dittrich\/misc\/trinoo.analysis , 1999 . Dittrich, D. The DoS Project's 'trinoo' distributed denial of service attack tool. https:\/\/staff.washington.edu\/dittrich\/misc\/trinoo.analysis, 1999."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-09-2016-0033"},{"key":"e_1_3_2_1_17_1","volume-title":"ACM SIGCOMM Poster","author":"Hohlfeld O.","year":"2018","unstructured":"Hohlfeld , O. Operating a DNS-based active internet observatory . In ACM SIGCOMM Poster ( 2018 ). Hohlfeld, O. Operating a DNS-based active internet observatory. In ACM SIGCOMM Poster (2018)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/01639625.2016.1169829"},{"key":"e_1_3_2_1_19_1","unstructured":"Interfax-Ukraine. Poroshenko reports on DDoS-attacks on Ukrainian CEC from Russia on Feb. 24-25. https:\/\/www.kyivpost.com\/ukraine-politics\/poroshenko-reports-on-ddos-attacks-on-ukrainian-cec-from-russia-on-feb-24-25.html 2019.  Interfax-Ukraine. Poroshenko reports on DDoS-attacks on Ukrainian CEC from Russia on Feb. 24-25. https:\/\/www.kyivpost.com\/ukraine-politics\/poroshenko-reports-on-ddos-attacks-on-ukrainian-cec-from-russia-on-feb-24-25.html 2019."},{"key":"e_1_3_2_1_20_1","volume-title":"ACM IMC","author":"Jonker M.","year":"2017","unstructured":"Jonker , M. , King , A. , Krupp , J. , Rossow , C. , Sperotto , A. , and Dainotti , A . Millions of targets under attack: a macroscopic characterization of the DoS ecosystem . In ACM IMC ( 2017 ). Jonker, M., King, A., Krupp, J., Rossow, C., Sperotto, A., and Dainotti, A. Millions of targets under attack: a macroscopic characterization of the DoS ecosystem. In ACM IMC (2017)."},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX","author":"Karami M.","year":"2013","unstructured":"Karami , M. , and McCoy , D. Rent to Pwn: Analyzing Commodity Booter DDoS Services . In USENIX ( 2013 ). Karami, M., and McCoy, D. Rent to Pwn: Analyzing Commodity Booter DDoS Services. In USENIX (2013)."},{"key":"e_1_3_2_1_22_1","volume-title":"D. Understanding the Emerging Threat of DDoS-as-a-service. In USENIX Workshop on Large-Scale Exploits and Emergent Threats","author":"Karami M.","year":"2013","unstructured":"Karami , M. , and McCoy , D. Understanding the Emerging Threat of DDoS-as-a-service. In USENIX Workshop on Large-Scale Exploits and Emergent Threats ( 2013 ). Karami, M., and McCoy, D. Understanding the Emerging Threat of DDoS-as-a-service. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (2013)."},{"key":"e_1_3_2_1_23_1","volume-title":"LEET","author":"Karami M.","year":"2013","unstructured":"Karami , M. , and McCoy , D. Understanding the emerging threat of ddos-as-a-service . In LEET ( 2013 ). Karami, M., and McCoy, D. Understanding the emerging threat of ddos-as-a-service. In LEET (2013)."},{"key":"e_1_3_2_1_24_1","volume-title":"WWW","author":"Karami M.","year":"2016","unstructured":"Karami , M. , Park , Y. , and McCoy , D. Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services . In WWW ( 2016 ). Karami, M., Park, Y., and McCoy, D. Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services. In WWW (2016)."},{"key":"e_1_3_2_1_25_1","first-page":"615","volume-title":"AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. In International Workshop on Recent Advances in Intrusion Detection (RAID)","author":"Kr\u00e4mer L.","year":"2015","unstructured":"Kr\u00e4mer , L. , Krupp , J. , Makita , D. , Nishizoe , T. , Koide , T. , Yoshioka , K. , and Rossow , C . AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. In International Workshop on Recent Advances in Intrusion Detection (RAID) ( 2015 ), Springer , pp. 615 -- 636 . Kr\u00e4mer, L., Krupp, J., Makita, D., Nishizoe, T., Koide, T., Yoshioka, K., and Rossow, C. AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. In International Workshop on Recent Advances in Intrusion Detection (RAID) (2015), Springer, pp. 615--636."},{"key":"e_1_3_2_1_26_1","volume-title":"KrebsOnSecurity Hit With Record DDoS. https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos","author":"Krebs B.","year":"2016","unstructured":"Krebs , B. KrebsOnSecurity Hit With Record DDoS. https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos , 2016 . Krebs, B. KrebsOnSecurity Hit With Record DDoS. https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos, 2016."},{"key":"e_1_3_2_1_27_1","unstructured":"Krebs B. UK Man Gets Two Years in Jail for Running 'Titanium Stresser' Attack-for-Hire Service. https:\/\/krebsonsecurity.com\/2017\/04\/uk-man-gets-two-years-in-jail-for-running-titanium-stresser-attack-for-hire-service\/ 2017.  Krebs B. UK Man Gets Two Years in Jail for Running 'Titanium Stresser' Attack-for-Hire Service. https:\/\/krebsonsecurity.com\/2017\/04\/uk-man-gets-two-years-in-jail-for-running-titanium-stresser-attack-for-hire-service\/ 2017."},{"key":"e_1_3_2_1_28_1","volume-title":"DDoS-for-Hire Service Webstresser Dismantled. https:\/\/krebsonsecurity.com\/2018\/04\/ddos-for-hire-service-webstresser-dismantled\/","author":"Krebs B.","year":"2018","unstructured":"Krebs , B. DDoS-for-Hire Service Webstresser Dismantled. https:\/\/krebsonsecurity.com\/2018\/04\/ddos-for-hire-service-webstresser-dismantled\/ , 2018 . Krebs, B. DDoS-for-Hire Service Webstresser Dismantled. https:\/\/krebsonsecurity.com\/2018\/04\/ddos-for-hire-service-webstresser-dismantled\/, 2018."},{"key":"e_1_3_2_1_29_1","volume-title":"Feds Charge Three in Mass Seizure of Attack-for-hire Services. https:\/\/krebsonsecurity.com\/2018\/12\/feds-charge-three-in-mass-seizure-of-attack-for-hire-services\/","author":"Krebs B.","year":"2018","unstructured":"Krebs , B. Feds Charge Three in Mass Seizure of Attack-for-hire Services. https:\/\/krebsonsecurity.com\/2018\/12\/feds-charge-three-in-mass-seizure-of-attack-for-hire-services\/ , 2018 . Krebs, B. Feds Charge Three in Mass Seizure of Attack-for-hire Services. https:\/\/krebsonsecurity.com\/2018\/12\/feds-charge-three-in-mass-seizure-of-attack-for-hire-services\/, 2018."},{"key":"e_1_3_2_1_30_1","volume-title":"250 Webstresser Users to Face Legal Action. https:\/\/krebsonsecurity.com\/2019\/02\/250-webstresser-users-to-face-legal-action\/","author":"Krebs B.","year":"2019","unstructured":"Krebs , B. 250 Webstresser Users to Face Legal Action. https:\/\/krebsonsecurity.com\/2019\/02\/250-webstresser-users-to-face-legal-action\/ , 2019 . Krebs, B. 250 Webstresser Users to Face Legal Action. https:\/\/krebsonsecurity.com\/2019\/02\/250-webstresser-users-to-face-legal-action\/, 2019."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_19"},{"key":"e_1_3_2_1_32_1","volume-title":"Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape. In 2nd International Conference on Advances in Computation, Communications and Services, ACCSE","author":"Kuhnert B.","year":"2017","unstructured":"Kuhnert , B. , Steinberger , J. , Baier , H. , Sperotto , A. , and Pras , A . Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape. In 2nd International Conference on Advances in Computation, Communications and Services, ACCSE ( 2017 ). Kuhnert, B., Steinberger, J., Baier, H., Sperotto, A., and Pras, A. Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape. In 2nd International Conference on Advances in Computation, Communications and Services, ACCSE (2017)."},{"key":"e_1_3_2_1_33_1","unstructured":"Lab K. Research reveals hacker tactics: Cybercriminals use ddos as smokescreen for other attacks on business. https:\/\/www.kaspersky.com\/about\/press-releases\/2016research-reveals-hacker-tactics-cybercriminals-use-ddos-as-smokescreen-for-other-attacks-on-business 2016.  Lab K. Research reveals hacker tactics: Cybercriminals use ddos as smokescreen for other attacks on business. https:\/\/www.kaspersky.com\/about\/press-releases\/2016research-reveals-hacker-tactics-cybercriminals-use-ddos-as-smokescreen-for-other-attacks-on-business 2016."},{"key":"e_1_3_2_1_34_1","volume-title":"ACM IMC","author":"Lichtblau F.","year":"2017","unstructured":"Lichtblau , F. , Streibelt , F. , Kr\u00fcger , T. , Richter , P. , and Feldmann , A . Detection, Classification, and Analysis of Inter-domain Traffic with Spoofed Source IP Addresses . In ACM IMC ( 2017 ). Lichtblau, F., Streibelt, F., Kr\u00fcger, T., Richter, P., and Feldmann, A. Detection, Classification, and Analysis of Inter-domain Traffic with Spoofed Source IP Addresses. In ACM IMC (2017)."},{"key":"e_1_3_2_1_35_1","unstructured":"Mohamed J. Daily Mirror: Hackers attack the Stock Exchange: Cyber criminals take down website for more than two hours as part of protest against world's banks. http:\/\/www.dailymail.co.uk\/news\/article-3625656\/Hackers-attack-Stock-Exchange-Cyber-criminals-website-two-hours-protest-against-world-s-banks.html 2016.  Mohamed J. Daily Mirror: Hackers attack the Stock Exchange: Cyber criminals take down website for more than two hours as part of protest against world's banks. http:\/\/www.dailymail.co.uk\/news\/article-3625656\/Hackers-attack-Stock-Exchange-Cyber-criminals-website-two-hours-protest-against-world-s-banks.html 2016."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA400003"},{"key":"e_1_3_2_1_37_1","volume-title":"NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack","author":"Morales C.","year":"2018","unstructured":"Morales , C. NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack ; The Terabit Attack Era Is Upon Us . https:\/\/asert.arbornetworks.com\/netscout-arbor-confirms-1-7-tbps-ddos-attack-terabit-attack-era-upon-us\/, 2018 . Morales, C. NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack; The Terabit Attack Era Is Upon Us. https:\/\/asert.arbornetworks.com\/netscout-arbor-confirms-1-7-tbps-ddos-attack-terabit-attack-era-upon-us\/, 2018."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_17"},{"key":"e_1_3_2_1_39_1","volume-title":"The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). https:\/\/blog.cloudflare.com\/the-ddos-that-knocked-spamhaus-offline-and-ho\/","author":"Prince M.","year":"2013","unstructured":"Prince , M. The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). https:\/\/blog.cloudflare.com\/the-ddos-that-knocked-spamhaus-offline-and-ho\/ , 2013 . Prince, M. The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). https:\/\/blog.cloudflare.com\/the-ddos-that-knocked-spamhaus-offline-and-ho\/, 2013."},{"key":"e_1_3_2_1_40_1","volume-title":"Technical Details Behind a 400Gbps NTP Amplification DDoS Attack. https:\/\/blog.cloudflare.com\/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack\/","author":"Prince M.","year":"2014","unstructured":"Prince , M. Technical Details Behind a 400Gbps NTP Amplification DDoS Attack. https:\/\/blog.cloudflare.com\/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack\/ , 2014 . Prince, M. Technical Details Behind a 400Gbps NTP Amplification DDoS Attack. https:\/\/blog.cloudflare.com\/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack\/, 2014."},{"key":"e_1_3_2_1_41_1","volume-title":"ACM IMC","author":"Richter P.","year":"2014","unstructured":"Richter , P. , Smaragdakis , G. , Feldmann , A. , Chatzis , N. , Boettger , J. , and Willinger , W . Peering at Peerings: On the Role of IXP Route Servers . In ACM IMC ( 2014 ). Richter, P., Smaragdakis, G., Feldmann, A., Chatzis, N., Boettger, J., and Willinger, W. Peering at Peerings: On the Role of IXP Route Servers. In ACM IMC (2014)."},{"key":"e_1_3_2_1_42_1","volume-title":"Amplification Hell: Revisiting Network Protocols for DDoS Abuse. NDSS","author":"Rossow C.","year":"2014","unstructured":"Rossow , C. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. NDSS ( 2014 ). Rossow, C. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. NDSS (2014)."},{"key":"e_1_3_2_1_43_1","volume-title":"Amplification and DRDoS Attack Defense-A Survey and New Perspectives. arXiv preprint arXiv:1505.07892","author":"Ryba F. J.","year":"2015","unstructured":"Ryba , F. J. , Orlinski , M. , W\u00e4hlisch , M. , Rossow , C. , and Schmidt , T. C . Amplification and DRDoS Attack Defense-A Survey and New Perspectives. arXiv preprint arXiv:1505.07892 ( 2015 ). Ryba, F. J., Orlinski, M., W\u00e4hlisch, M., Rossow, C., and Schmidt, T. C. Amplification and DRDoS Attack Defense-A Survey and New Perspectives. arXiv preprint arXiv:1505.07892 (2015)."},{"key":"e_1_3_2_1_44_1","volume-title":"International journal of network management 28 (Jan","author":"Santanna J.","year":"2018","unstructured":"Santanna , J. , de Vries , J. , de O. Schmidt , R. , Tuncer , D., Z. Granville , L. , and Pras , A . Booter list generation: The basis for investigating DDoS-for-hire websites . International journal of network management 28 (Jan 2018 ). Santanna, J., de Vries, J., de O. Schmidt, R., Tuncer, D., Z. Granville, L., and Pras, A. Booter list generation: The basis for investigating DDoS-for-hire websites. International journal of network management 28 (Jan 2018)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600992"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2016.7818410"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140298"},{"key":"e_1_3_2_1_48_1","volume-title":"OVH suffers 1.1Tbps DDoS attack. https:\/\/www.scmagazineuk.com\/ovh-suffers-11tbps-ddos-attack\/article\/532197\/","author":"Media UK.","year":"2016","unstructured":"SC Media UK. OVH suffers 1.1Tbps DDoS attack. https:\/\/www.scmagazineuk.com\/ovh-suffers-11tbps-ddos-attack\/article\/532197\/ , 2016 . SC Media UK. OVH suffers 1.1Tbps DDoS attack. https:\/\/www.scmagazineuk.com\/ovh-suffers-11tbps-ddos-attack\/article\/532197\/, 2016."},{"key":"e_1_3_2_1_49_1","volume-title":"ACM IMC","author":"Scheitle Q.","year":"2018","unstructured":"Scheitle , Q. , Hohlfeld , O. , Gamba , J. , Jelten , J. , Zimmermann , T. , Strowes , S. D. , and Vallina-Rodriguez , N. A long way to the top: Significance, structure, and stability of internet top lists . In ACM IMC ( 2018 ). Scheitle, Q., Hohlfeld, O., Gamba, J., Jelten, J., Zimmermann, T., Strowes, S. D., and Vallina-Rodriguez, N. A long way to the top: Significance, structure, and stability of internet top lists. In ACM IMC (2018)."},{"key":"e_1_3_2_1_50_1","volume-title":"The Sipgate DDoS Story. https:\/\/medium.com\/@sipgate\/ddos-attacke-auf-sipgate-a7d18bf08c03","author":"Sipgate","year":"2014","unstructured":"Sipgate . The Sipgate DDoS Story. https:\/\/medium.com\/@sipgate\/ddos-attacke-auf-sipgate-a7d18bf08c03 , 2014 . Sipgate. The Sipgate DDoS Story. https:\/\/medium.com\/@sipgate\/ddos-attacke-auf-sipgate-a7d18bf08c03, 2014."},{"key":"e_1_3_2_1_51_1","volume-title":"2018 State of the Internet \/ Security: A Year in Review. https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/2018-state-of-the-internet-security-a-year-in-review.pdf","author":"Technologies A.","year":"2018","unstructured":"Technologies , A. 2018 State of the Internet \/ Security: A Year in Review. https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/2018-state-of-the-internet-security-a-year-in-review.pdf , 2018 . Technologies, A. 2018 State of the Internet \/ Security: A Year in Review. https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/2018-state-of-the-internet-security-a-year-in-review.pdf, 2018."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945057"},{"key":"e_1_3_2_1_53_1","volume-title":"Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool. https:\/\/www.nytimes.com\/2017\/05\/12\/world\/europe\/uk-national-health-service-cyberattack.html","author":"Times N. Y.","year":"2017","unstructured":"Times , N. Y. Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool. https:\/\/www.nytimes.com\/2017\/05\/12\/world\/europe\/uk-national-health-service-cyberattack.html , 2017 . Times, N. Y. Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool. https:\/\/www.nytimes.com\/2017\/05\/12\/world\/europe\/uk-national-health-service-cyberattack.html, 2017."},{"key":"e_1_3_2_1_54_1","volume-title":"Russia accused of unleashing cyberwar to disable Estonia. https:\/\/www.theguardian.com\/world\/2007\/may\/17\/topstories3.russia","author":"Traynor I.","year":"2007","unstructured":"Traynor , I. Russia accused of unleashing cyberwar to disable Estonia. https:\/\/www.theguardian.com\/world\/2007\/may\/17\/topstories3.russia , 2007 . Traynor, I. Russia accused of unleashing cyberwar to disable Estonia. https:\/\/www.theguardian.com\/world\/2007\/may\/17\/topstories3.russia, 2007."},{"key":"e_1_3_2_1_55_1","volume-title":"UDP-Based Amplification Attacks. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-017A","author":"CERT.","year":"2018","unstructured":"US- CERT. UDP-Based Amplification Attacks. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-017A , 2018 . US-CERT. UDP-Based Amplification Attacks. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-017A, 2018."},{"key":"e_1_3_2_1_56_1","unstructured":"US Department of Justice. Criminal Charges Filed in Los Angeles and Alaska in Conjunction with Seizures Of 15 Websites Offering DDoS-For-Hire Services. https:\/\/www.justice.gov\/opa\/pr\/criminal-charges-filed-los-angeles-and-alaska-conjunction-seizures-15-websites-offering-ddos 2018.  US Department of Justice. Criminal Charges Filed in Los Angeles and Alaska in Conjunction with Seizures Of 15 Websites Offering DDoS-For-Hire Services. https:\/\/www.justice.gov\/opa\/pr\/criminal-charges-filed-los-angeles-and-alaska-conjunction-seizures-15-websites-offering-ddos 2018."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.8114519"},{"key":"e_1_3_2_1_58_1","volume-title":"GitHub hit with the largest DDoS attack ever seen. https:\/\/www.zdnet.com\/article\/github-was-hit-with-the-largest-ddos-attack-ever-seen\/","author":"Net","year":"2018","unstructured":"ZD Net . GitHub hit with the largest DDoS attack ever seen. https:\/\/www.zdnet.com\/article\/github-was-hit-with-the-largest-ddos-attack-ever-seen\/ , 2018 . ZDNet. GitHub hit with the largest DDoS attack ever seen. https:\/\/www.zdnet.com\/article\/github-was-hit-with-the-largest-ddos-attack-ever-seen\/, 2018."},{"key":"e_1_3_2_1_59_1","volume-title":"Booter Blacklist Generation Based on Content Characteristics. In International Conference on Collaborative Computing: Networking, Applications and Worksharing","author":"Zhang W.","year":"2018","unstructured":"Zhang , W. , Bai , X. , Chen , C. , and Chen , Z . Booter Blacklist Generation Based on Content Characteristics. In International Conference on Collaborative Computing: Networking, Applications and Worksharing ( 2018 ), Springer. Zhang, W., Bai, X., Chen, C., and Chen, Z. Booter Blacklist Generation Based on Content Characteristics. In International Conference on Collaborative Computing: Networking, Applications and Worksharing (2018), Springer."}],"event":{"name":"IMC '19: ACM Internet Measurement Conference","location":"Amsterdam Netherlands","acronym":"IMC '19","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355590","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355369.3355590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:33Z","timestamp":1750202613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355590"}},"subtitle":["On the Effectiveness of a Booter Services Takedown"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":59,"alternative-id":["10.1145\/3355369.3355590","10.1145\/3355369"],"URL":"https:\/\/doi.org\/10.1145\/3355369.3355590","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}