2014/1/17 Jan Reister <[email protected]>:
> Il 17/01/2014 11:45, Matteo Cantoni ha scritto:
>> volevo segnalarvi una pagina web dove raccolgo alcune statistiche relative
>> al mio honeypot DNS casalingo (una sola linea ADSL, 1 solo indirizzo IP):
>> http://www.nothink.org/honeypot_dns.php
>
> Molto carino, gli open dns resolver sono un bel problema, ma mai quanto
> i server NTP aperti:
>
> https://www.us-cert.gov/ncas/alerts/TA14-013A
>
> Se vuoi divertirti con l'ultima moda
c'è un paper/talk che sembra promettente a NDSS2014 proprio sugli
amplification attack. Finora c'è solo l'abstract, ma dall'autore mi
aspetto un bel lavoro.
Amplification Hell: Revisiting Network Protocols for DDoS Abuse
We revisit 14 popular UDP-based protocols of network services, online
games, P2P filesharing networks and P2P botnets, all of which are
vulnerable to amplification DDoS attacks. We leverage traffic analysis
to detect attack victims and amplifiers, showing that attackers
already started to abuse amplification-vulnerable protocols other than
DNS.
URL: http://www.internetsociety.org/ndss2014/programme
Stay tuned :)
-F
Submit your papers at the "Security for Distributed Systems" track @
The 12th IEEE International Conference on Embedded and Ubiquitous
Computing - http://euc14.necst.it
________________________________________________________
http://www.sikurezza.org - Italian Security Mailing List