Botnet-Based Distributed Denial of Service (DDoS) Attacks On Web Servers Classification and Arts
Botnet-Based Distributed Denial of Service (DDoS) Attacks On Web Servers Classification and Arts
net/publication/230610009
CITATIONS READS
177 5,314
5 authors, including:
Shankar Karuppayah
Universiti Sains Malaysia
68 PUBLICATIONS 972 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
EAI FABULOUS 2022 - 6th EAI International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures View project
All content following this page was uploaded by Esraa Alomari on 01 June 2014.
24
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012
25
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012
4. BOTNETS BASED DDOS ATTACK Unlike currently popular attack tools that can launch DDoS
attacks, most organizations are unaware of the broad
TOOLS development over the last few years and are vulnerable to
Various DDoS attack tools are known and architectures are attackers, according to the Arbor Networks. Commercial
very similar that some tools actually originate from minor services, along with downloadable tools, can launch attacks
modifications of other tools [12]. In this section, the for a fee [5]. Therefore, we discuss the bot tools that launch
functionality of a number of these tools is discussed. The DDoS attacks on the application layer. Approximately 20,000
Botnet based DDoS attack tools are classified as agent-based, infected computers with multiple targets can destroy over
IRC-based, or Web-based DDoS attack tools. 90% of Internet sites [21]. A DDoS attack on the application
layer is highly comparable to calling someone in the world
4.1 Agent-based DDoS Attack Tools from one Website, while the Web site indicates being out of
Agent-based DDoS attack tools are based on the agent– service or displays ―the page cannot found.‖ Therefore, the
handler DDoS attack model comprising handlers, agents, and server hosting the site cannot process all requests on the same
victims, as described in Section 3.1. Examples of agent-based site, in contrast to the compromising handler that injects the
DDoS tools are Trinoo, Tribe Flood Network (TFN), TFN2K, site with bots controlled by attackers. The attacker
Stacheldraht, Mstream, and Shaft [13]. Among the consequently demonstrates the use of different tools to
abovementioned agent-based DDoS tools, Trinoo [14] is the execute a successful attack. In the following sections, three
most popular and the most widely used for its capability for Web-based DDoS attack tools are described.
bandwidth depletion and for launching UDP flood attacks
against one or numerous Internet protocol (IP) addresses.
Shaft [15], on the other hand, is similar to Trinoo in that it can
4.3.1 BlackEnergy
launch packet flooding attacks. Shaft can also control the BlackEnergy [60] is a Web-based DDoS bot used by
duration of the attack, as well as the size of the flooding unidentified Russian hackers. BlackEnergy easily controls
packets. Web-based bots through minimal syntax and structure,
resulting in the launch of various attacks. One or more
TFN [16] is another DDoS attack tool that can conduct Russian hackers had apparently developed this tool.
bandwidth and resource depletion attacks. TFN can perform Meanwhile, most BlackEnergy C&C systems are seen in
Smurf, UDP flooding, TCP SYN flooding, ICMP echo Malaysia and in Russia, with Russian sites being the primary
request flooding, and ICMP directed broadcast. TFN2K [15], targets. One of the main features that BlackEnergy bot
as a derivative of TFN, can perform Smurf, SYN, UDP, and promote in forums is the capability to target more than one IP
ICMP flood attacks. TFN2K has the special capability of address per host name. This tool continues to be widely used
adding encrypted messages between attack components. to deny services from commercial Web sites.
Stacheldraht [17] is a product of previous TFN attempts.
Stacheldraht strengthens a number of TFN‘s weak points and 4.3.2 Low-Orbit Ion Cannon (LOIC)
is capable of implementing Smurf, SYN flood, UDP flood, The LOIC is a Botnet-based DDoS attack tool that releases
and ICMP flood attacks. On the other hand, Mstream [18] is a flooding in the server. This flooding apparently results from
simple point-to-point TCP ACK flooding tool that can the large volume of HTTP traffic. However, this tool has been
overwhelm fast-routing routine tables in some switches. used recently by an anonymous group to facilitate malicious
traffic through the Zeus Botnet, which is an advanced
4.2 IRC-based DDoS Attack Tools malware program that cannot be easily removed. The hacker
group administered the largest attack in 2012 against famous
IRC-based DDoS attack tools were developed after the
Web sites, such as the Department of Justice (DOJ) and the
emergence of agent–handler attack tools. More sophisticated
Federal Bureau of investigation (FBI) [22].
IRC-based tools have been developed, and these tools include
the important features of several agent-handler attack tools.
The Trinity is one of the best-known IRC-based DDoS tools 4.3.3 Aldi Botnet
on top of UDP, TCP SYN, TCP ACK, and TCP NUL packet Aldi is a newer inexpensive DDoS bot that is growing in
floods. The Trinity v3 [19] introduces TCP random flag popularity. Recent data [59] suggests that there are at least 50
packet floods, TCP fragment floods, TCP established floods, distinct Aldi bot binaries that have been seen in the wild with
and TCP RST packet floods. Along with the development of 44 unique Command & Control (C&C) points. As per Arbor
the Trinity came the myServer [15], that rely on external company which monitors real time Internet traffic, this bot is
programs to conduct DoS and plague to simulate TCP ACK active in Russia, Ukraine, US and Germany.
and TCP SYN flooding. Knight [20] is another light-weight
and powerful IRC-based DDoS attack tool that can perform 5. CLASSIFICATION OF BOTNETS
UDP flood attacks and SYN attacks. Knight can be considered BASED DDOS ATTACKS
an urgent pointer flooder [9]. An IRC-based DDoS tool based The wide variety of DDoS attacks indicates the various
on Knight is Kaiten [20], which conducts UDP, TCP flood conducted taxonomies of such attacks [9, 23-27]. New kinds
attacks, SYN, and PUSH+ACH attacks. of attacks are identified daily, and some remain undiscovered.
In this work, we focus on Botnet based DDoS attacks that
4.3 Web-based DDoS Attack Tools affect the application layer, especially the Web server [28].
Web-based DDoS attack tools were recently developed with The type of DDoS attack depends on the vulnerability of
the purpose of attacking the application layer, especially the exploitation. The first type of attack is characterized by the
Web server. IRC-based DDoS attack tools with the HTTP/S consumption of the resources of the host. The victim can
flooding function are used to attack a Web server, thus generally be a Web server or a proxy connected to the
proving that attackers are increasingly adopting various tools Internet. When the traffic load is high, packets are sent out to
to introduce DDoS attacks [5]. inform senders, who can either be legitimate users or attack
sources, to reduce their sending rates. Legitimate users
respond by decreasing their sending rates, whereas attack
26
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012
sources maintain or even increase their sending rates. download a large file from the target. The file is then read by
Consequently, resources of the host, such as the CPU or the target from the hard disk, stored in the memory, and
memory capacity, become depleted, and the host is hindered finally loaded into the packets, which are sent back to the
from servicing legitimate traffic. The second type of attack Botnet. Hence, a simple HTTP request can significantly
involves the consumption of network bandwidth. If malicious consume resources in the CPU, memory, input/output devices,
traffic in the network dominates the communication links, and outbound Internet link.
traffic from legitimate sources is obstructed. In effect,
bandwidth DDoS attacks are more disruptive than attacks However, the behavior of HTTP requests from the
resulting in resource consumption [29]. Detail discussion of abovementioned example can be obvious. Repetitive requests
these attacks is given below: for a large file can be detected and can then be blocked.
Attackers mimic legitimate traffic by instructing the Botnet to
send an HTTP request to the target Web site, analyze the
5.1 Net DDoS-based Bandwidth Attacks replies, and then recursively follow the links. The HTTP
Net DDoS-based bandwidth attacks are normally introduced requests from the attacker consequently become very similar
effectively from a single attack source that takes advantage of to normal Web traffic, thus explaining the extreme difficulty
specific IP weaknesses. Examples of such attacks are SYN in filtering this type of HTTP flood.
and ICMP flood attacks.
5.1.2 ICMP Flood Attacks 5.2.2 Session Initiation Protocol (SIP) Flood
ICMP is based on the IP protocol that can diagnose the status Attacks
of the network. An ICMP flood attack is a bandwidth attack The SIP is a widely supported standard for call set-up in
that uses ICMP packets that can be directed to an individual Voice-over IP (VoIP). SIP proxy servers generally require
machine or to an entire network. When a packet is sent from a public Internet access to accomplish the standard in accepting
machine to an IP broadcast address in the local network, all call set-up requests from any VoIP client. For scalability, SIP
machines in the network receive the packet. When a packet is is typically implemented with UDP to become stateless. The
sent from a machine to the IP broadcast address outside the attacker can flood the SIP proxy in one attack using SIP
local network, the packet is delivered to all machines in the INVITE packets that pose as genuine source IP addresses. To
target network. Other types of ICMP flood attack are the avoid counter-hacking mechanisms, attackers can also launch
SMURF and the Ping-of-Death attacks [31]. the flood from a Botnet through a legitimate source IP
address. Two victim categories emerge in this attack scenario.
5.2 App-DDoS Attacks The first type comprises the SIP proxy servers with depleted
Attack power can be amplified by forcing the target to execute server resources as a result of the processing of SIP INVITE
expensive operations. These attacks can consume all available packets, while their network capacity is consumed by the SIP
corporate bandwidth and fill the pipes with illegitimate traffic. INVITE flood. The SIP proxy server subsequently becomes
Routing protocols can also be affected and services are incapable of providing VoIP service. The second type of
disrupted by either resetting the routing protocols or offering victim is the call receiver, who becomes overwhelmed by fake
data that harm server operation [29]. VoIP calls and encounters difficulty in reaching legitimate
callers [33].
5.2.1 HTTP Flood Attacks
5.2.3 Distributed Reflector Attacks
An attack that bombards Web servers with HTTP requests is
Attackers should necessarily hide the true sources of their
called an HTTP flood attack. According to [32], HTTP flood
resulting attack traffic. Figure 4 illustrates the distributed
attacks are common in most Botnet software programs. To
reflector denial of service (DRDoS) attack, which hides attack
send an HTTP request, a valid TCP connection that requires a
traffic sources using third parties, such as routers or Web
genuine IP address has to be established. Attackers send an
servers, during the relay of the attack traffic to the victim.
HTTP request through the IP address of a bot and then
These third parties are called reflectors. Any machine that
formulate the HTTP requests in different ways to maximize
responds to an incoming packet is a potential reflector. A
the attack power or to avoid detection. An attacker, for
DRDoS attack has three stages. In the second stage, after the
example, can manipulate the Botnet to send HTTP requests to
attacker has gained control of ―zombies,‖ these ―zombies‖ are
27
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012
instructed to send attack traffic information to the victims firewalls and IPS devices will pass legitimate traffic—thus
through the third parties, with the victim‘s IP address as the eliminating one layer of security for the attacker.
source IP address. In the third stage, the third parties send the
reply traffic to the victim. This stage constitutes the DDoS 5.3.2 Follow the Money
attack. This type of attack had shut down a security research Attackers see a major opportunity for extortion when
Web site (i.e. www.grc.com), in January 2002. DRDoS has applications are supporting high revenue-generating services.
been considered a potent and increasingly prevalent Internet For example, an online gaming company is far more likely to
attack. Unlike a traditional DDoS attack, the traffic from a pay an attacker to stop a DDoS attack that is costing millions
DRDoS attack is further dispersed through third parties, per day in revenue than is an owner of a nonprofit Web site.
resulting in the increased distribution of the attack traffic and
increasing the difficulty in the identification of the attack. 5.3.3 More Bang for the Buck
Moreover, the source IP addresses of the attack traffic point to
innocent third parties, thus complicating the process of tracing Some attacks cause significantly more collateral damage than
the attack traffic source. Finally, as observed by [34] and [35], others. For example, a DNS attack that targets a single DNS
DRDoS attacks can amplify the attack traffic, thereby making service provider impacts not only that provider but all of its
the attack even more potent. In the succeeding section, an customers as well.
actual example demonstrates the serious threat posed by
Organizations are beginning to realize that the power to
DRDoS attacks.
rapidly stop application-layer DDoS attacks that target
Internet-facing services is imperative for business continuity
5.2.4 Domain Name System (DNS) Amplification and success.
Attacks
An example of effective reflector attack is the DNS What makes this sort of attack different than a network or
amplification attack shown in Figure 5. DNS provides a transport layer attack is that there is no way for upstream
distributed infrastructure for the storage and association of networking equipment to easily detect and filter out the
different resource records (RR) with Internet domain names. attacker, since at the packet level, the traffic appears to be
DNS translates domain names into IP addresses. A recursive normal application traffic. System administrators and
DNS server usually accepts a query and then resolves a given application developers of potential targets must instead take
domain name for the requester. A recursive name server often measures to build DDoS protection into their network and
contacts other authoritative name servers when necessary and application design. Techniques such as caching and load
subsequently returns the query response to the requester [36]. balancing can increase the applications ability to absorb a
DNS query responses have disproportional sizes that normally flood of requests without becoming offline.
comprise the original query and the answer. The query 6. BOTNETS BASED DDOS ATTACK
response packet is always larger than the query packet.
Moreover, a query response can contain multiple RR, and
INCIDENTS
A DDoS attack is a major Internet threat as it can create a
some RR types can be very large.
huge volume of unwanted traffic. DDoS attacks can prevent
access to a particular resource, such as a Web site [37]. The
A huge first reported large-scale DDoS attack occurred in August
Step3: Botnet number of 1999 against a University [38]. The attack had shut down the
recursive
victim‘s network for over two days. In 7 February 2000, a
sends spoofed
number of Websites went offline for several hours after an
DNS request DNS
attack [38]. In some cases, DDoS attacks can produce
servers
approximately 1 Gbit/s of attack traffic against a single victim
available [39]. In February 2001, over 12,000 attacks were registered
on the against more than 5,000 distinct victims over a three-week
Step4: Amplified DNS
activate the botnet
Step1: compromise DNS DDoS attacks usually continuously target DNS. In October
server by sending signal to 2002, all root name servers underwent an exceptionally
activate the bots intensive DoS attack [41] with some non-received DNS
requests to an outsourced DNS service in Akamai, which were
Fig. 5: DNS Attack meant to enhance service performance. In 2004, UK online
bookmaking, betting, and gambling sites were overwhelmed
5.3 Trends that surprise in application- by DoS attacks launched by unidentified attackers. The
layer DDoS attacks Internet-based business service of Al Jazeera, a provider of
Arabic-language news services, was similarly attacked in
5.3.1 Bypass One Layer of Security January 2005. The text-to-speech translation application in the
In most cases, the applications that attackers are trying to Sun Microsystem‘s Grid computing system was disabled
exploit or target are well-known and must be ―allowed‖ during its opening day by a DoS attack in March 2006.
through perimeter security devices such as firewalls or IPS
devices. For example, by default, firewalls allow HTTP or In [39], the presence of roughly 2,000 to 3,000 active DoS
DNS traffic. IPS devices are not much different as they attacks per week was described using an updated backscatter
enforce security policy by inspecting packets for signatures of analysis. The attack record over a three-year period revealed
known threats. DDoS attacks take advantage of the fact that 68,700 attacks on over 34,700 distinct Internet hosts from
28
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012
more than 5,300 organizations. Some DNS requests failed to [2] H. R. Zeidanloo, A. A. Manaf, "Botnet command and
reach a root name server because of the congestion caused by control mechanisms," in the proc. of Second
the DoS attack. In [41], another major DoS attack occurred International Conference on Computer and Electrical
on 15 June 2004 against name servers in the Akamai Content Engineering, (ICCEE '09), pp. 564-568, 2009.
Distribution Network. This attack blocked almost all access to
such sites as Apple computer, Google, Microsoft, and Yahoo [3] C. Douligeris and D. N. Serpanos, "Network security:
for more than two hours. These companies supposedly current status and future directions," Wiley-IEEE Press,
outsourced their DNS service to Akamai for improved 2007.
performance. [4] B. B. Gupta, M. Misra, R. C. Joshi, ―FVBA: A
Combined Statistical Approach for Low Rate Degrading
6.1 Recent Botnet based DDoS Incidents and High Bandwidth Disruptive DDoS Attacks Detection
DDoS attacks occur almost daily. Even well-known websites, in ISP Domain,‖ in the proceedings of 16th IEEE
such as Twitter, Facebook, Google, and other popular search International Conference on Networks (ICON-2008),
engines, cannot escape these attacks that affect countless DOI: 10.1109/ICON.2008.4772654, New Delhi, India,
users. An eye-opener case was the DDoS incident that 2008.
targeted the White House, FBI, DOJ [42], the Recording
[5] D. McPherson, ―Worldwide Infrastructure Security
Business Association of America, Universal Music Websites,
Report," Arbor Networks, January 19th, 2010, avilable
and the Hong Kong Stock Exchange [43]. A total of 80
at:
computers were compromised by the Botnet and up to
http://ipv6.org.sa/sites/default/files/World_Infrastructure
250,000 were infected with malware during the attack. The
_Security_Report_ 2011.pdf.
attack traffic consumed 45 gigabytes per second according to
the 7th Annual Report from the Arbor Company 2011 [5]. [6] Cloudflare, "2011: The Year of the DDoS". Available at:
The outage lasted for seven days, the longest in 2010. In 2011, http://blog.cloudflare.com/2011-the-year-of-the-ddos.
the longest attack ever recorded target a travel company,
lasting for 80 days, 19 hours, 13 minutes, and 5 seconds. The [7] S. Byers, et al., "Defending against an Internet-based
average duration of DDoS attacks is 9 hours and 29 minutes. attack on the physical world," ACM Transactions on
The observed DDoS incidents from 2011 to the first quarter of Internet Technology (TOIT), vol. 4, pp. 239-254, 2004.
2012 are shown in Table 1. [8] F. Freiling, et al., "Botnet tracking: Exploring a root-
cause methodology to prevent distributed denial-of-
6.2 Financial Losses by Botnet based DDoS service attacks," Computer Security–ESORICS 2005, pp.
Attack 319-335, 2005.
Large-scale attacks cause substantial financial damage to [9] S. M. Specht and R. B. Lee, "Distributed denial of
companies relying on the Internet for their daily business. service: Taxonomies of attacks, tools, and
Direct (e.g., revenue loss during the attack) and indirect (e.g., countermeasures," in the Proceedings of the International
customer loss attributed to degraded reputation) damages are Workshop on Security in Parallel and Distributed
also experienced. E-commerce and stock exchange sites spend Systems, 2004, pp. 543-550.
millions of dollars to recover from these attacks, whereas
other companies allocate a huge amount of money to defend [10] K. J. Houle, "Trends in Denial of Service Attack
themselves from possible hackers. As indicated by the survey Technology," CERT Coordination Center, Carnegie
of VeriSign respondents, expenditures reach up to $2.5 Mellon Software Engineering Institute, oct 2001.
million [57]. Table 2 shows the loss of revenue attributed to [11] V. Company, "Distributed Denial of Service (DDoS) and
service disruption among large companies in the world. Botnet Attacks," An iDefense Security Report, 2006.
29
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012
[17] D. Dittrich, "The stacheldraht," distributed denial of [32] P. Bächer, et al., "Know your enemy: Tracking botnets,"
service attack tool, 1999. Available: The Honeynet Project and Research Alliance, Tech. Rep,
http://staff.washington.edu/dittrich/misc/stacheldraht.ana 2005.
lysis.
[33] J. Rosenberg, et al, "RFC 3261 SIP: Session initiation
[18] G. W. David Dittrich , Sven Dietrich , Neil Long, "The protocol", 2002. Available at: www.ietf.org
mstream," distributed denial of service attack tool, 2000.
Available at: [34] V. Paxson, "An analysis of using reflectors for
http://staff.washington.edu/dittrich/misc/mstream.analysi distributed denial-of-service attacks," ACM SIGCOMM
s.txt. Computer Communication Review, vol. 31, pp. 38-47,
2001.
[19] B. Hancock, "Trinity v3, a DDoS tool, hits the streets,"
Computers & Security, vol. 19, pp. 574-574, 2000. [35] S. Gibson, "Distributed reflection denial of service,"
2002. Available at: http://grc. com/dos/drdos.htm.
[20] Bysin, ―knight.c sourcecode," 2001. Available at:
http://packetstormsecurity.org/distributed/ knight.c. [36] P. V. Mockapetris, "Domain names-concepts and
facilities," RFC, USA, 1987.
[21] F. Y. Rashid, "DDoS Attack Tools, Service Help Target
Organizations: Arbor Networks," Feb, 2012. Available [37] M. Sachdeva, et al., "DDoS Incidents and their Impact: A
at: http://www.eweek.com/c/a/Security/DDoS-Attack- Review," International Arab Journal of Information
Tools-Service-Help-Target-Organizations-Arbor- Technology, vol. 7, pp. 14-19, 2010.
Networks-763865. [38] L. Garber, "Denial-of-service attacks rip the Internet,"
[22] E. Mills, ―DOJ, FBI, entertainment industry sites IEEE Computer, vol. 33, pp. 12-17, 2000.
attacked after piracy arrests ", 2012. Available: [39] D. Moore, et al., "Inferring internet denial-of-service
http://news.cnet.com/8301-27080_3-57362279-245/doj- activity," ACM Transactions on Computer Systems
fbi-entertainment-industry-sites-attacked-after-piracy- (TOCS), vol. 24, pp. 115-139, 2006.
arrests.
[40] ITworld.com.. "CERT hit by DDoS attack for a third
[23] J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack day," 2001. Available at:
and DDoS defense mechanisms," ACM SIGCOMM http://www.itworld.com/IDG010524CERT2
Computer Communication Review, vol. 34, pp. 39-53,
2004. [41] C. Gonsalves, "Akamai DDoS Attack Whacks Web
Traffic," 2004. Available: at
[24] B. B. Gupta, R. C. Joshi, M. Misra, ―An ISP level http://www.eweek.com/c/a/IT-Infrastructure/Akamai-
solution to combat DDoS attacks using combined DDoS-Attack-Whacks-Web-Traffic-Sites/
statistical based approach,‖ International Journal of
Information Assurance and Security (JIAS), 3 (2), pp. [42] FBI, "Justice Department Charges Leaders of
102-110, 2008. Megaupload with Widespread Online Copyright
Infringement," 2012. Available at:
[25] U. Tariq, et al., "A comprehensive categorization of http://www.fbi.gov/news/pressrel/press-releases/justice-
DDoS attack and DDoS defense techniques," Advanced department-charges-leaders-of-megaupload-with-
Data Mining and Applications, pp. 1025-1036, 2006. widespread-online-copyright-infringement.
[26] A. Asosheh Dr and N. Ramezani, "A comprehensive [43] Headlines, "DDoS Attacks Against Government and
taxonomy of DDOS attacks and defense mechanism Entertainment Websites Escalate," 2012. Available at:
applying in a smart classification," WSEAS Transactions http://www.infosecisland.com/blogview/19543-DDoS-
on Computers, vol. 7, pp. 281-290, 2008. Attacks-Against-Government-and-Entertainment-
[27] B. B. Gupta, R. C. Joshi, M. Misra, ―Defending against Websites-Escalate.html.
Distributed Denial of Service Attacks: Issues and [44] E. Hill, "Hackers hit Tunisian websites," 2011. Available
Challenges,‖ Information Security Journal: A Global at: http://www.aljazeera.com/news/
Perspective, vol. 18, issue 5, Taylor & Francis, UK, pp. africa/2011/01/201113111059792596.html.
224-247, 2009. DOI: 10.1080/19393550903317070
[45] The journal.ie, "Fine Gael website defaced by
[28] Debasish Das, Utpal Sharma, D. K. Bhattacharyya., Anonymous ‗hacktivists‘," 2011. Available at:
"Detection of HTTP flooding attacks in multiple http://www.thejournal.ie/fine-gael-website-defaced-by-
scenarios," in the proc. of ICCCS-2011, 2011, pp.517- anonymous-hacktivists-2011-01.
522.
[46] R. Somaiya, "Hackers Shut Down Government Sites,"
[29] A Mishra, BB Gupta, RC Joshi, ―A Comparative Study 2011. Available at:
of Distributed Denial of Service Attacks, Intrusion http://www.nytimes.com/2011/02/03/world/middleeast/0
Tolerance and Mitigation Techniques," In the proc. of 3hackers.html?_r=2.
European Intelligence and Security Informatics
Conference (EISIC-2011), , pp. 286-289, 2011. [47] P. Bright, "Anonymous speaks: the inside story of the
HBGary hack," 2011. Available at:
[30] D. C. Wyld, et al., "Trends in Network and http://arstechnica.com/tech-policy/2011/02/anonymous-
Communications," International Conferences, NeCOM, speaks-the-inside-story-of-the-hbgary-hack.
197: Springer, 2011.
[48] B. N. Technology, "Anonymous denies Westboro
[31] M. Zelkowitz, "New programming paradigms," vol. 64, attack," 2011. Available at:
Academic Press, 2005. http://www.bbc.co.uk/news/technology-12535456.
30
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012
31
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012
Tunisian Government Web sites 3 January 2011 Web site outage that included the president, prime minister, ministry
of industry, ministry of foreign affairs, and stock exchange [44]
FINE GAEL‘s News Web site 9 January 2011 One-night content outage by an anonymous attacker using the LOIC
tool [45]
www.finegael2011.com
Egyptian government Web sites 25 January Site went offline from the beginning of the revolution until the
2011 president stepped down [46]
HB Gary Federal 5–6 February Hacked by dumping 68,000 e-mails from the system [47]
2011
Operation Ouraborus 16 February Threats from an anonymous attacker who hacked the site and caused
2011 irreversible damage [48]
NEW YORK (CNN Money) 3 March 2011 The huge attack hit the company‘s data centers with tens of millions
of packets per second [49]
Operation Empire State Rebellion 14 March 2011 Threat from an anonymous attacker affecting the Bank of America
[50]
Operation Sony April 2011 Outage of the Play Station Network [51]
Spanish Police 12 Jun 2011 DDoS attack lasted for approximately one hour [52]
Operation Malaysia 15 Jun 2011 Outage of 91 Web sites of the Malaysian Government that started
7:30 pm GMT [53]
Malaysia.gov.my
Operation Orlando 16 Jun 2011 Orlando government Web sites went offline daily because of the
LOIC tool [54]
Visa Card, Master Card, Wikileaks and 27 July 2011 Payment processing from Wikileaks through PayPal were
www.paypal.com continuously denied [55]
Hong Kong stock exchange 15 August Hundreds of companies were affected with a single target [56]
2011
Justice.gov, MPAA.org, White House, the FBI, 19 Jan 2012 The largest attack for 2012 from an anonymous attacker who shut
BMI.com, Copyright.com, Viacom, Anti- down all the affected sites for 10 minutes [22]
piracy.be/nl, Vivendi.fr, Hadopi.fr, and
ChrisDodd.com,
32