Jeferson Eleazar Martínez-Lozano, Pedro Sandino Atencio-Ortiz
{"title":"使用HTTP-GET洪水和网络杀伤链方法创建DDOS攻击","authors":"Jeferson Eleazar Martínez-Lozano, Pedro Sandino Atencio-Ortiz","doi":"10.15332/ITECKNE.V16I1.2160","DOIUrl":null,"url":null,"abstract":"This article illustrates by means of a demonstration and taking advantage of the vulnerability “Open redirect”, how easy it can be to attack web servers through distributed attacks of denial of services. In it, the Cyber Kill Chain® model is used to carry out this attack in phases. In the development of the research, a systematic UFONet tool is applied and the results obtained are analyzed and it is recommended to protect the Internet application services of said attacks through web application firewalls (WAF) whose presence allows the DDoS traffic of the application layer (including the HTTP-GET flood) arrives effortlessly at the destination server.","PeriodicalId":53892,"journal":{"name":"Revista Iteckne","volume":null,"pages":null},"PeriodicalIF":0.5000,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Creation of a DDOS attack using HTTP-GET Flood with the Cyber Kill Chain methodology\",\"authors\":\"Jeferson Eleazar Martínez-Lozano, Pedro Sandino Atencio-Ortiz\",\"doi\":\"10.15332/ITECKNE.V16I1.2160\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article illustrates by means of a demonstration and taking advantage of the vulnerability “Open redirect”, how easy it can be to attack web servers through distributed attacks of denial of services. In it, the Cyber Kill Chain® model is used to carry out this attack in phases. In the development of the research, a systematic UFONet tool is applied and the results obtained are analyzed and it is recommended to protect the Internet application services of said attacks through web application firewalls (WAF) whose presence allows the DDoS traffic of the application layer (including the HTTP-GET flood) arrives effortlessly at the destination server.\",\"PeriodicalId\":53892,\"journal\":{\"name\":\"Revista Iteckne\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2019-06-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Revista Iteckne\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.15332/ITECKNE.V16I1.2160\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Revista Iteckne","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15332/ITECKNE.V16I1.2160","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
Creation of a DDOS attack using HTTP-GET Flood with the Cyber Kill Chain methodology
This article illustrates by means of a demonstration and taking advantage of the vulnerability “Open redirect”, how easy it can be to attack web servers through distributed attacks of denial of services. In it, the Cyber Kill Chain® model is used to carry out this attack in phases. In the development of the research, a systematic UFONet tool is applied and the results obtained are analyzed and it is recommended to protect the Internet application services of said attacks through web application firewalls (WAF) whose presence allows the DDoS traffic of the application layer (including the HTTP-GET flood) arrives effortlessly at the destination server.