Abstract
Behind everything we do in our daily lives there is a reason for doing it. This paper looks into the motives behind DDoS attacks as a form of cyberattack along with attacker personas. This paper also investigates DDoS attacks technically and it is suggested that there is a need for a socio-technical approach to these attacks to investigate why they occur and the reasoning the attacker(s) could have for launching these attacks. This paper finds several motives behind DDoS attacks and discusses the profiles that attackers can be sorted into. Also discussed are the motives that attacker profiles can have for launching DDoS attacks. Although mitigation techniques are in place to control the damage a DDoS attack can cause to a company, if the motives can be addressed first, these attacks could be prevented. With the use of case studies, visualisations and tables, the motives behind DDoS attacks and attacker personas are presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fruhlinger, J. (2018). What is a cyber attack? Recent examples show disturbing trends. Retrieved from https://www.csoonline.com/article/3237324/what-is-a-cyber-attack-recent-examples-show-disturbing-trends.html
Netscout. (n.d). What is DDoS? Retrieved from https://www.netscout.com/what-is-ddos
CISA. (n.d). Understanding denial-of-service attacks. Retrieved from https://www.us-cert.gov/ncas/tips/ST04-015
Sadok, M., Katos, V., & Bednar, P. (2014). Developing contextual understanding of information security risks. Conference: Human Aspects of Information Security & Assurance (HAISA 2014). Retrieved from https://www.researchgate.net/publication/263939773_Developing_Contextual_Understanding_of_Information_Security_Risks
Russell, G. (2017). Feature: Resisting the persistent threat of cyber-attacks. Computer Fraud & Security, 7–11. https://doi.org/10.1016/S1361-3723(17)30107-0
Verizon. (2018). 2018 Data breach investigations report. Retrieved from https://enterprise.verizon.com/resources/reports/DBIR_2018_Report_execsummary.pdf
Makrushin, D. (2017). The cost of launching a DDoS attack. Retrieved from https://securelist.com/the-cost-of-launching-a-ddos-attack/77784/
Radware. (2017). Anatomy of a hacker: Profiles, motivations & tools of the trade. Retrieved from https://security.radware.com/WorkArea/DownloadAsset.aspx?id=1396
Mansfield-Devine, S. (2016). DDoS goes mainstream: How headline-grabbing attacks could make this threat an organisation’s biggest nightmare. Network Security, (11), 7–13. https://doi.org/10.1016/S1353-4858(16)30104-0
Hilbert, E. (2013). Feature: Living with cybercrime. Network Security, 15–17. https://doi.org/10.1016/S1353-4858(13)70126-0
Hjortdal, M. (2011). China’s use of cyber warfare: Espionage meets strategic deterrence. Journal of Strategic Security, 4(2), 1. Retrieved from https://search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.26463924&site=eds-live
Hollier, R. (n.d). Criminology: Why do people commit crimes? Retrieved from https://www.thelawproject.com.au/blog/criminology-and-why-do-people-commit-crimes
Thackray, H., McAlaney, J., Dogan, H., Taylor, J., & Richardson, C. (2016). Social psychology: An under-used tool in cybersecurity. British HCI 2016 Conference Fusion. https://doi.org/10.14236/ewic/HCI2016.64
Mehan, J. (2014). Cyberwar, cyberterror, cybercrime & cyberactivism. Chapter 2. IT Governance Publishing. Retrieved from https://www.jstor.org/stable/j.ctt7zsxqq.7
Sibi Chakkaravarthy, S., Sangeetha, D., Venkata Rathnam, M., Srinithi, K., & Vaidehi, V. (2018). Futuristic cyber-attacks. International Journal of Knowledge Based Intelligent Engineering Systems, 22(3), 195–204. https://doi.org/10.3233/KES-180384
Oliveira, M. (2011 Updated 2018). Hacking group says they do it for the ‘lulz'. Retrieved from https://www.theglobeandmail.com/technology/tech-news/hacking-group-says-they-do-it-for-the-lulz/article556865/
Dellinger, A. J. (2018). French teens arrested for hacking Vevo, defacing Despacito music video. Retrieved from https://gizmodo.com/french-teens-arrested-for-hacking-vevo-defacing-despac-1826348217
Raymond, N. (2019). Massachusetts man gets 10 years in prison for hospital cyberattack. Retrieved from https://www.reuters.com/article/us-massachusetts-cyber/massachusetts-man-gets-10-years-in-prison-for-hospital-cyberattack-idUSKCN1P42J8
IT Governance. (n.d.). Penetration testing. Retrieved from https://www.itgovernance.co.uk/penetration-testing
Boulton, C. (2017). Humans are the weakest cybersecurity link. Retrieved from https://www.cio.com/article/3191088/humans-are-still-the-weakest-cybersecurity-link.html
Ponemon & Symantec. (2013). Ponemon and Symantec find most data breaches caused by human and system errors. Retrieved from https://www.symantec.com/about/newsroom/press-releases/2013/symantec_0605_01
Whetstone, T. (2018). Knox county election night cyberattack was smokescreen for another attack. Retrieved from https://eu.knoxnews.com/story/news/local/2018/05/17/knox-county-election-cyberattack-smokescreen-another-attack/620921002/
Williams, C. (2015). Carphone warehouse hackers ‘used traffic bombardment smokescreen’. Retrieved from https://www.telegraph.co.uk/finance/newsbysector/epic/cpw/11794521/Carphone-Warehouse-hackers-used-traffic-bombardment-smokescreen.html
Phillips, T. (2011). The great Sony PSN Hack. Retrieved from https://www.eurogamer.net/articles/2016-04-26-sony-admitted-the-great-psn-hack-five-years-ago-today
Ghandi, R, & Sharma, A. (2011). Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine (1), 28. https://doi.org/10.1109/MTS.2011.940293
Muncaster, P. (2018). Man gets 15 years for DDoS revenge campaign. Retrieved from https://www.infosecurity-magazine.com/news/man-gets-15-years-for-ddos-revenge/
Hall, K. (2015). NCA targeted by Lizard Squad in apparent DDoS revenge attack. Retrieved from https://www.theregister.co.uk/2015/09/01/nca_targeted_by_lizard_squad/
Jeffrey, C. (2018). WoW player sentenced to a year in federal prison for crashing Blizzard servers. Retrieved from https://www.techspot.com/news/74517-wow-player-sentenced-year-federal-prison-crashing-blizzard.html
Shackelford, S. (2018). This is how one man accidentally destroyed the internet 30 years ago. Retrieved from https://www.inverse.com/article/50422-worlds-first-cyberattack-happened-30-years-ago-robert-tappan-morris
Campbell, M. (2017). Apple’s iOS 10.3 fixes flaw used in accidental DDoS attack on 911 call system. Retrieved from https://appleinsider.com/articles/17/03/30/apples-ios-103-fixes-flaw-used-in-accidental-ddos-attack-on-911-call-system
Morisy, M. (2017). Breitbart News’ FBI file details how site accidentally DDoS’d itself. Retrieved from https://www.muckrock.com/news/archives/2017/sep/19/breitbart-fbi-file-details-how-site-ddos/
Dipert, R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4), 384–410. https://doi.org/10.1080/15027570.2010.536404
Sultan, O. (2016). Massive DDoS attack shut down several pro-ISIS websites. Retrieved from https://www.hackread.com/ddos-attack-on-pro-isis-websites/
Conger, K. (2017). US blames North Korea for series of DDoS Attacks. Retrieved from https://gizmodo.com/us-blames-north-korea-for-series-of-ddos-attacks-1796070321
Traynor, I. (2007). Russia accused of unleashing cyberwar to disable Estonia. Retrieved from https://www.theguardian.com/world/2007/may/17/topstories3.russia
Krupansky, J. (2018). Cybersecurity personas, use cases, and access patterns. Retrieved from https://medium.com/@jackkrupansky/cybersecurity-personas-use-cases-and-access-patterns-41fb8c9894ad
Gov.uk. (n.d.). Whistleblowing for employees. Retrieved from https://www.gov.uk/whistleblowing
The Courage Foundation. (n.d). Who is Edward Snowden and what did he do? Retrieved from https://www.edwardsnowden.com/frequently-asked-questions/
ZoneFox. (n.d). Insider threat profiles. Retrieved from https://www.zonefox.com/download-insider-threat-profiles/
Bell, A. J. C., Rogers, M. B., & Pearce, J. M. (2019). The insider threat: Behavioral indicators and factors influencing likelihood of intervention. International Journal of Critical Infrastructure Protection, 24, 166–176. https://doi.org/10.1016/j.ijcip.2018.12.001
Bugcrowd. (2017). Inside the mind of a hacker. Retrieved from https://www.bugcrowd.com/inside-the-mind-of-a-hacker-2-0/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Traer, S., Bednar, P. (2021). Motives Behind DDoS Attacks. In: Metallo, C., Ferrara, M., Lazazzara, A., Za, S. (eds) Digital Transformation and Human Behavior. Lecture Notes in Information Systems and Organisation, vol 37. Springer, Cham. https://doi.org/10.1007/978-3-030-47539-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-47539-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-47538-3
Online ISBN: 978-3-030-47539-0
eBook Packages: Business and ManagementBusiness and Management (R0)