Victimization in DDoS attacks: The role of popularity and industry sector

IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Muhammad Yasir Muzayan Haq , Antonia Affinito , Alessio Botta , Anna Sperotto , Lambert J.M. Nieuwenhuis , Mattijs Jonker , Abhishta Abhishta
{"title":"Victimization in DDoS attacks: The role of popularity and industry sector","authors":"Muhammad Yasir Muzayan Haq ,&nbsp;Antonia Affinito ,&nbsp;Alessio Botta ,&nbsp;Anna Sperotto ,&nbsp;Lambert J.M. Nieuwenhuis ,&nbsp;Mattijs Jonker ,&nbsp;Abhishta Abhishta","doi":"10.1016/j.jisa.2025.104242","DOIUrl":null,"url":null,"abstract":"<div><div>Distributed denial-of-service (DDoS) attacks may be driven not only by economic motives such as extortion, but also by social or political goals, including hacktivism and state-sponsored operations. Therefore, the monetary value of a target alone does not fully explain why some organizations are more frequently victimized. While cloud providers deploy advanced defenses — such as Anycast routing, traffic scrubbing, and filtering — they also concentrate many potential targets within a shared infrastructure, increasing their exposure to DDoS attacks.</div><div>This study aims to understand what makes organizations more suitable DDoS targets by examining two key attributes: visibility and perceived value, represented by website popularity and industry sector. We also investigate how the customer portfolio of cloud and data center providers influences the DDoS threat to their infrastructure.</div></div><div><h3>Research Questions:</h3><div>• How do organizational characteristics related to value and visibility — specifically, popularity and industry sector — correlate with the threat of DDoS attacks?</div><div>• How does the diversity of customer business sectors hosted by a cloud or data center provider influence the DDoS threat to its infrastructure?</div></div><div><h3>Methodology:</h3><div>We conducted a large-scale analysis of DDoS incidents inferred from network telescope data spanning five years. We estimated target visibility and value using Alexa ranks and Cisco Umbrella content categories. We also analyzed the relationship between customer sector composition and DDoS threat at the provider level.</div></div><div><h3>Key Findings:</h3><div>• Popular websites are more frequently attacked, though this pattern weakened during the COVID-19 pandemic.</div><div>• Certain industry sectors face significantly higher and repeated DDoS threats.</div><div>• Cloud providers serving a higher proportion of high-risk sectors are more likely to face frequent DDoS attacks.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104242"},"PeriodicalIF":3.7000,"publicationDate":"2025-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002790","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Distributed denial-of-service (DDoS) attacks may be driven not only by economic motives such as extortion, but also by social or political goals, including hacktivism and state-sponsored operations. Therefore, the monetary value of a target alone does not fully explain why some organizations are more frequently victimized. While cloud providers deploy advanced defenses — such as Anycast routing, traffic scrubbing, and filtering — they also concentrate many potential targets within a shared infrastructure, increasing their exposure to DDoS attacks.
This study aims to understand what makes organizations more suitable DDoS targets by examining two key attributes: visibility and perceived value, represented by website popularity and industry sector. We also investigate how the customer portfolio of cloud and data center providers influences the DDoS threat to their infrastructure.

Research Questions:

• How do organizational characteristics related to value and visibility — specifically, popularity and industry sector — correlate with the threat of DDoS attacks?
• How does the diversity of customer business sectors hosted by a cloud or data center provider influence the DDoS threat to its infrastructure?

Methodology:

We conducted a large-scale analysis of DDoS incidents inferred from network telescope data spanning five years. We estimated target visibility and value using Alexa ranks and Cisco Umbrella content categories. We also analyzed the relationship between customer sector composition and DDoS threat at the provider level.

Key Findings:

• Popular websites are more frequently attacked, though this pattern weakened during the COVID-19 pandemic.
• Certain industry sectors face significantly higher and repeated DDoS threats.
• Cloud providers serving a higher proportion of high-risk sectors are more likely to face frequent DDoS attacks.
受害在DDoS攻击中的作用:受欢迎程度和行业部门
分布式拒绝服务(DDoS)攻击可能不仅受到经济动机(如勒索)的驱动,还受到社会或政治目标的驱动,包括黑客行动主义和国家支持的行动。因此,仅仅目标的金钱价值并不能完全解释为什么一些组织更经常成为受害者。虽然云提供商部署了先进的防御措施,如任意播路由、流量清洗和过滤,但它们也将许多潜在目标集中在一个共享的基础设施中,从而增加了它们遭受DDoS攻击的风险。本研究旨在通过检查两个关键属性:可见性和感知价值(以网站受欢迎程度和行业部门为代表),了解是什么使组织更适合DDoS攻击目标。我们还调查了云计算和数据中心提供商的客户组合如何影响对其基础设施的DDoS威胁。•与价值和可见性相关的组织特征(特别是受欢迎程度和行业部门)如何与DDoS攻击的威胁相关联?•云计算或数据中心提供商托管的客户业务部门的多样性如何影响其基础设施面临的DDoS威胁?方法:我们对从网络望远镜数据中推断的DDoS事件进行了大规模分析,时间跨度为五年。我们使用Alexa排名和Cisco Umbrella内容类别来估计目标可见性和价值。我们还在供应商层面分析了客户部门构成与DDoS威胁之间的关系。•热门网站更频繁地受到攻击,尽管这种模式在COVID-19大流行期间有所减弱。•某些行业面临的DDoS威胁明显增多且反复发生。•服务高风险行业比例较高的云提供商更有可能面临频繁的DDoS攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信