Skip to main content

Motives Behind DDoS Attacks

  • Conference paper
  • First Online:
Digital Transformation and Human Behavior

Part of the book series: Lecture Notes in Information Systems and Organisation ((LNISO,volume 37))

Abstract

Behind everything we do in our daily lives there is a reason for doing it. This paper looks into the motives behind DDoS attacks as a form of cyberattack along with attacker personas. This paper also investigates DDoS attacks technically and it is suggested that there is a need for a socio-technical approach to these attacks to investigate why they occur and the reasoning the attacker(s) could have for launching these attacks. This paper finds several motives behind DDoS attacks and discusses the profiles that attackers can be sorted into. Also discussed are the motives that attacker profiles can have for launching DDoS attacks. Although mitigation techniques are in place to control the damage a DDoS attack can cause to a company, if the motives can be addressed first, these attacks could be prevented. With the use of case studies, visualisations and tables, the motives behind DDoS attacks and attacker personas are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fruhlinger, J. (2018). What is a cyber attack? Recent examples show disturbing trends. Retrieved from https://www.csoonline.com/article/3237324/what-is-a-cyber-attack-recent-examples-show-disturbing-trends.html

  2. Netscout. (n.d). What is DDoS? Retrieved from https://www.netscout.com/what-is-ddos

  3. CISA. (n.d). Understanding denial-of-service attacks. Retrieved from https://www.us-cert.gov/ncas/tips/ST04-015

  4. Sadok, M., Katos, V., & Bednar, P. (2014). Developing contextual understanding of information security risks. Conference: Human Aspects of Information Security & Assurance (HAISA 2014). Retrieved from https://www.researchgate.net/publication/263939773_Developing_Contextual_Understanding_of_Information_Security_Risks

  5. Russell, G. (2017). Feature: Resisting the persistent threat of cyber-attacks. Computer Fraud & Security, 7–11. https://doi.org/10.1016/S1361-3723(17)30107-0

    Article  Google Scholar 

  6. Verizon. (2018). 2018 Data breach investigations report. Retrieved from https://enterprise.verizon.com/resources/reports/DBIR_2018_Report_execsummary.pdf

  7. Makrushin, D. (2017). The cost of launching a DDoS attack. Retrieved from https://securelist.com/the-cost-of-launching-a-ddos-attack/77784/

  8. Radware. (2017). Anatomy of a hacker: Profiles, motivations & tools of the trade. Retrieved from https://security.radware.com/WorkArea/DownloadAsset.aspx?id=1396

  9. Mansfield-Devine, S. (2016). DDoS goes mainstream: How headline-grabbing attacks could make this threat an organisation’s biggest nightmare. Network Security, (11), 7–13. https://doi.org/10.1016/S1353-4858(16)30104-0

    Article  Google Scholar 

  10. Hilbert, E. (2013). Feature: Living with cybercrime. Network Security, 15–17. https://doi.org/10.1016/S1353-4858(13)70126-0

    Article  Google Scholar 

  11. Hjortdal, M. (2011). China’s use of cyber warfare: Espionage meets strategic deterrence. Journal of Strategic Security, 4(2), 1. Retrieved from https://search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.26463924&site=eds-live

  12. Hollier, R. (n.d). Criminology: Why do people commit crimes? Retrieved from https://www.thelawproject.com.au/blog/criminology-and-why-do-people-commit-crimes

  13. Thackray, H., McAlaney, J., Dogan, H., Taylor, J., & Richardson, C. (2016). Social psychology: An under-used tool in cybersecurity. British HCI 2016 Conference Fusion. https://doi.org/10.14236/ewic/HCI2016.64

  14. Mehan, J. (2014). Cyberwar, cyberterror, cybercrime & cyberactivism. Chapter 2. IT Governance Publishing. Retrieved from https://www.jstor.org/stable/j.ctt7zsxqq.7

  15. Sibi Chakkaravarthy, S., Sangeetha, D., Venkata Rathnam, M., Srinithi, K., & Vaidehi, V. (2018). Futuristic cyber-attacks. International Journal of Knowledge Based Intelligent Engineering Systems, 22(3), 195–204. https://doi.org/10.3233/KES-180384

    Article  Google Scholar 

  16. Oliveira, M. (2011 Updated 2018). Hacking group says they do it for the ‘lulz'. Retrieved from https://www.theglobeandmail.com/technology/tech-news/hacking-group-says-they-do-it-for-the-lulz/article556865/

  17. Dellinger, A. J. (2018). French teens arrested for hacking Vevo, defacing Despacito music video. Retrieved from https://gizmodo.com/french-teens-arrested-for-hacking-vevo-defacing-despac-1826348217

  18. Raymond, N. (2019). Massachusetts man gets 10 years in prison for hospital cyberattack. Retrieved from https://www.reuters.com/article/us-massachusetts-cyber/massachusetts-man-gets-10-years-in-prison-for-hospital-cyberattack-idUSKCN1P42J8

  19. IT Governance. (n.d.). Penetration testing. Retrieved from https://www.itgovernance.co.uk/penetration-testing

  20. Boulton, C. (2017). Humans are the weakest cybersecurity link. Retrieved from https://www.cio.com/article/3191088/humans-are-still-the-weakest-cybersecurity-link.html

  21. Ponemon & Symantec. (2013). Ponemon and Symantec find most data breaches caused by human and system errors. Retrieved from https://www.symantec.com/about/newsroom/press-releases/2013/symantec_0605_01

  22. Whetstone, T. (2018). Knox county election night cyberattack was smokescreen for another attack. Retrieved from https://eu.knoxnews.com/story/news/local/2018/05/17/knox-county-election-cyberattack-smokescreen-another-attack/620921002/

  23. Williams, C. (2015). Carphone warehouse hackers ‘used traffic bombardment smokescreen’. Retrieved from https://www.telegraph.co.uk/finance/newsbysector/epic/cpw/11794521/Carphone-Warehouse-hackers-used-traffic-bombardment-smokescreen.html

  24. Phillips, T. (2011). The great Sony PSN Hack. Retrieved from https://www.eurogamer.net/articles/2016-04-26-sony-admitted-the-great-psn-hack-five-years-ago-today

  25. Ghandi, R, & Sharma, A. (2011). Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine (1), 28. https://doi.org/10.1109/MTS.2011.940293

  26. Muncaster, P. (2018). Man gets 15 years for DDoS revenge campaign. Retrieved from https://www.infosecurity-magazine.com/news/man-gets-15-years-for-ddos-revenge/

  27. Hall, K. (2015). NCA targeted by Lizard Squad in apparent DDoS revenge attack. Retrieved from https://www.theregister.co.uk/2015/09/01/nca_targeted_by_lizard_squad/

  28. Jeffrey, C. (2018). WoW player sentenced to a year in federal prison for crashing Blizzard servers. Retrieved from https://www.techspot.com/news/74517-wow-player-sentenced-year-federal-prison-crashing-blizzard.html

  29. Shackelford, S. (2018). This is how one man accidentally destroyed the internet 30 years ago. Retrieved from https://www.inverse.com/article/50422-worlds-first-cyberattack-happened-30-years-ago-robert-tappan-morris

  30. Campbell, M. (2017). Apple’s iOS 10.3 fixes flaw used in accidental DDoS attack on 911 call system. Retrieved from https://appleinsider.com/articles/17/03/30/apples-ios-103-fixes-flaw-used-in-accidental-ddos-attack-on-911-call-system

  31. Morisy, M. (2017). Breitbart News’ FBI file details how site accidentally DDoS’d itself. Retrieved from https://www.muckrock.com/news/archives/2017/sep/19/breitbart-fbi-file-details-how-site-ddos/

  32. Dipert, R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4), 384–410. https://doi.org/10.1080/15027570.2010.536404

    Article  Google Scholar 

  33. Sultan, O. (2016). Massive DDoS attack shut down several pro-ISIS websites. Retrieved from https://www.hackread.com/ddos-attack-on-pro-isis-websites/

  34. Conger, K. (2017). US blames North Korea for series of DDoS Attacks. Retrieved from https://gizmodo.com/us-blames-north-korea-for-series-of-ddos-attacks-1796070321

  35. Traynor, I. (2007). Russia accused of unleashing cyberwar to disable Estonia. Retrieved from https://www.theguardian.com/world/2007/may/17/topstories3.russia

  36. Krupansky, J. (2018). Cybersecurity personas, use cases, and access patterns. Retrieved from https://medium.com/@jackkrupansky/cybersecurity-personas-use-cases-and-access-patterns-41fb8c9894ad

  37. Gov.uk. (n.d.). Whistleblowing for employees. Retrieved from https://www.gov.uk/whistleblowing

  38. The Courage Foundation. (n.d). Who is Edward Snowden and what did he do? Retrieved from https://www.edwardsnowden.com/frequently-asked-questions/

  39. ZoneFox. (n.d). Insider threat profiles. Retrieved from https://www.zonefox.com/download-insider-threat-profiles/

  40. Bell, A. J. C., Rogers, M. B., & Pearce, J. M. (2019). The insider threat: Behavioral indicators and factors influencing likelihood of intervention. International Journal of Critical Infrastructure Protection, 24, 166–176. https://doi.org/10.1016/j.ijcip.2018.12.001

    Article  Google Scholar 

  41. Bugcrowd. (2017). Inside the mind of a hacker. Retrieved from https://www.bugcrowd.com/inside-the-mind-of-a-hacker-2-0/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Scott Traer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Traer, S., Bednar, P. (2021). Motives Behind DDoS Attacks. In: Metallo, C., Ferrara, M., Lazazzara, A., Za, S. (eds) Digital Transformation and Human Behavior. Lecture Notes in Information Systems and Organisation, vol 37. Springer, Cham. https://doi.org/10.1007/978-3-030-47539-0_10

Download citation

Publish with us

Policies and ethics