Evaluation of TFTP DDoS amplification attack
- Submitting institution
-
Edinburgh Napier University
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 1111267
- Type
- D - Journal article
- DOI
-
10.1016/j.cose.2015.09.006
- Title of journal
- Computers and Security
- Article number
- -
- First page
- 67
- Volume
- 57
- Issue
- -
- ISSN
- 0167-4048
- Open access status
- Out of scope for open access requirements
- Month of publication
- October
- Year of publication
- 2015
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
2
- Research group(s)
-
-
- Citation count
- 15
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- The paper outlines a new UDP-based DDoS Amplification/Reflection attack. Trivial File Transfer Protocol (TFTP) has been used to produce a DDoS attack with an amplification factor of around 60. Not long after the research work was published, it led to several media publications including an article in The Register. The attack was highlighted by Akamai in their 2016 State of the Internet report with a medium threat level, and further updates outlined how threat actors were using it.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -