Presentation 2017-03-13
Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot
Tomomi Nishizoe, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In DRDoS attacks, attackers abuse UDP-based protocols that can amplify traffic. It's essential that we find such protocols as early as possible in order to prevent DRDoS attacks. In this study, we show that protocol-agnostic DRDoS honeypot can find them early. In two-year-long operation, the honeypots were able to observe new DRDoS attack vectors whose protocols had not been known to have amplification vulnerabilities. Moreover, we show that they detected new attack vectors before reported at security and hacking related sites.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) DRDoS Attack / DRDoS Honeypot
Paper # ICSS2016-48
Date of Issue 2017-03-06 (ICSS)

Conference Information
Committee ICSS / IPSJ-SPT
Conference Date 2017/3/13(2days)
Place (in Japanese) (See Japanese page)
Place (in English) University of Nagasaki
Topics (in Japanese) (See Japanese page)
Topics (in English) System Security, etc.
Chair Yutaka Miyake(KDDI R&D Labs.)
Vice Chair Yoshiaki Shiraishi(Kobe Univ.) / Takeshi Ueda(Mitsubishi Electric)
Secretary Yoshiaki Shiraishi(NII) / Takeshi Ueda(Yokohama National Univ.)
Assistant Kazunori Kamiya(NTT) / Takahiro Kasama(NICT)

Paper Information
Registration To Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot
Sub Title (in English)
Keyword(1) DRDoS Attack
Keyword(2) DRDoS Honeypot
1st Author's Name Tomomi Nishizoe
1st Author's Affiliation Yokohama National University(Yokohama National Univ.)
2nd Author's Name Daisuke Makita
2nd Author's Affiliation Yokohama National University/National Institute of Information and Communications Technology(Yokohama National Univ./NICT)
3rd Author's Name Katsunari Yoshioka
3rd Author's Affiliation Yokohama National University(Yokohama National Univ.)
4th Author's Name Tsutomu Matsumoto
4th Author's Affiliation Yokohama National University(Yokohama National Univ.)
Date 2017-03-13
Paper # ICSS2016-48
Volume (vol) vol.116
Number (no) ICSS-522
Page pp.pp.13-18(ICSS),
#Pages 6
Date of Issue 2017-03-06 (ICSS)