Jeferson Eleazar Martínez-Lozano, Pedro Sandino Atencio-Ortiz
{"title":"Creation of a DDOS attack using HTTP-GET Flood with the Cyber Kill Chain methodology","authors":"Jeferson Eleazar Martínez-Lozano, Pedro Sandino Atencio-Ortiz","doi":"10.15332/ITECKNE.V16I1.2160","DOIUrl":null,"url":null,"abstract":"This article illustrates by means of a demonstration and taking advantage of the vulnerability “Open redirect”, how easy it can be to attack web servers through distributed attacks of denial of services. In it, the Cyber Kill Chain® model is used to carry out this attack in phases. In the development of the research, a systematic UFONet tool is applied and the results obtained are analyzed and it is recommended to protect the Internet application services of said attacks through web application firewalls (WAF) whose presence allows the DDoS traffic of the application layer (including the HTTP-GET flood) arrives effortlessly at the destination server.","PeriodicalId":53892,"journal":{"name":"Revista Iteckne","volume":null,"pages":null},"PeriodicalIF":0.5000,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Revista Iteckne","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15332/ITECKNE.V16I1.2160","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 1
Abstract
This article illustrates by means of a demonstration and taking advantage of the vulnerability “Open redirect”, how easy it can be to attack web servers through distributed attacks of denial of services. In it, the Cyber Kill Chain® model is used to carry out this attack in phases. In the development of the research, a systematic UFONet tool is applied and the results obtained are analyzed and it is recommended to protect the Internet application services of said attacks through web application firewalls (WAF) whose presence allows the DDoS traffic of the application layer (including the HTTP-GET flood) arrives effortlessly at the destination server.