Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6884201 | Computers & Security | 2016 | 41 Pages |
Abstract
Amplification attacks use intermediate devices called amplifiers in order to amplify the attacker's traffic. This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Protocol (TFTP). This attack could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks. This could be a substantial issue globally, due to the fact this protocol is used in approximately 599,600 publicly open TFTP servers. Mitigation methods to this threat have also been considered and a variety of countermeasures are proposed. Effects of this attack on both amplifier and target were analysed based on the proposed metrics. While it has been reported that the breaching of TFTP would be possible (Schultz, 2013), this paper provides a complete methodology for the setup of the attack, and its verification.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Boris Sieklik, Richard Macfarlane, William J. Buchanan,