Creation of a DDOS attack using HTTP-GET Flood with the Cyber Kill Chain methodology

  • Martínez-Lozano J
  • Atencio-Ortiz P
N/ACitations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

This article illustrates by means of a demonstration and taking advantage of the vulnerability “Open redirect”, how easy it can be to attack web servers through distributed attacks of denial of services. In it, the Cyber Kill Chain® model is used to carry out this attack in phases. In the development of the research, a systematic UFONet tool is applied and the results obtained are analyzed and it is recommended to protect the Internet application services of said attacks through web application firewalls (WAF) whose presence allows the DDoS traffic of the application layer (including the HTTP-GET flood) arrives effortlessly at the destination server.

Cite

CITATION STYLE

APA

Martínez-Lozano, J. E., & Atencio-Ortiz, P. S. (2019). Creation of a DDOS attack using HTTP-GET Flood with the Cyber Kill Chain methodology. ITECKNE, 16(1), 41–47. https://doi.org/10.15332/iteckne.v16i1.2160

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free