Service in Denial – Clouds Going with the Winds

  • Vit Bukac
  • Vlasta Stavova
  • Lukas Nemec
  • Zdenek Riha
  • Vashek Matyas
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9408)


We analyze the threat of DDoS-for-hire services to low and medium power cloud-based servers or home users. We aim to investigate popularity and availability of such services, their payment models, subscription pricing, complexity of the generated attack traffic and performance.


Cloud Provider Attack Type Packet Length Payment Method Packet Rate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    SimilarWeb. (accessed June 26, 2015)
  2. 2.
    Karami, M., McCoy, D.: Understanding the emerging threat of DDoS-as-a-Service. In: 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (2013)Google Scholar
  3. 3.
    Bukac, V.: DDoS-Vault project (2015). (accessed August 16, 2015)
  4. 4.
    Akamai. The State of the Internet Report Q4 2014. Technical report (2015)Google Scholar
  5. 5.
    Sood, A.K., Enbody, R.J.: Crimeware-as-a-service - A survey of commoditized crimeware in the underground market. International Journal of Critical Infrastructure Protection 6(1), 28–38 (2013)CrossRefGoogle Scholar
  6. 6.
    Czyz, J., Kallitsis, M., Gharaibeh, M., Papadopoulos, C., Bailey, M., Karir, M.: Taming the 800 Pound Gorilla: the rise and decline of NTP DDoS attacks. In: Proceedings of the 2014 Conference on Internet Measurement. ACM (2014)Google Scholar
  7. 7.
    PLXsert. SSDP Reflection DDoS Attacks. PLXsert Threat Advisory, September 2014Google Scholar
  8. 8.
    Kornblum, J.: Identifying almost identical files using context triggered piecewise hashing. Digital Investigation 3 (2006)Google Scholar
  9. 9.
    Yu, S., Tian, Y., Guo, S., Wu, D.: Can We Beat DDoS Attacks in Clouds?. IEEE Transactions on Parallel and Distributed Systems 25(9) (2014)Google Scholar
  10. 10.
    Krebs, B.: DDoS Services Advertise Openly, Take PayPal, May 2013. (accessed August 16, 2015)
  11. 11.
    Krebs, B.: Lizard Kids: A Long Trail of Fail, December 2014. (accessed August 16, 2015)
  12. 12.
    Santanna, J.J., van Rijswijk-Deij, R., Sperotto, A., Hofstede, R., Wierbosch, M., Zambenedetti Granville, L., Pras, A.: Booters - an analysis of DDoS-as-a-service attacks. In: Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management (2015)Google Scholar
  13. 13.
    Santanna, J.J., Durban, R., Sperotto, A., Pras, A.: Inside booters: an analysis on operational databases. In: Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management (2015)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Vit Bukac
    • 1
  • Vlasta Stavova
    • 1
  • Lukas Nemec
    • 1
  • Zdenek Riha
    • 1
  • Vashek Matyas
    • 1
  1. 1.Faculty of InformaticsMasaryk UniversityBrnoCzech Republic

Personalised recommendations