To request access this dataset you will need to login with an IMPACT account. Accounts are free. If you don't have one please register.

Summary

DS-0777
FRGP_SSDP_Reflection_DDoS_Attack_Traffic_anon-20140930
Dataset
University of Southern California-Information Sciences Institute
University of Southern California-Information Sciences Institute
09/30/2014
09/30/2014
26 (lowest rank is 51)

Category & Restrictions

Traffic Flow Data
traffic flow data, denial of service
Quasi-Restricted
true

Description


SSDP reflection attack

About 3 hours of DDoS attack traffic to a victim in the form of Argus flows. Most of the attack traffic is UDP Simple Service Discovery Protocol (SSDP) traffic. The traffic also includes ICMP and other UDP protocols traffic. The IP addresses are fully anonymized using a prefix-preserving algorithm. The flows are on a 10Gb/s link between a regional and a content ISP. These attacks are triggered by the attackers via UPnP/SSDP discovery requests with spoofed source IP addresses to vulnerable hosts running SSDP.

Additional Details

5.0GB
true
false
network layer protocols, cybercrime, dos, communication protocol, frgp_ssdp_reflection_ddos_attack_traffic_anon-20140930, servers, attack, 777, internet protocol, data protection, ssdp, telecom, universal plug and play, img college, simple service discovery protocol, internet security, data anonymization, denial of service attack, internet control message protocol, cyberwarfare, information privacy, digital media, virginia tech hokies, university of southern california-information sciences institute, reflector, cyberattack, internet layer protocols, reflection attack, internet relay chat, exploit
DOS Reflector attack SSDP