Motives behind ddos attacks

Scott Traer*, Peter Bednar

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Behind everything we do in our daily lives there is a reason for doing it. This paper looks into the motives behind DDoS attacks as a form of cyberattack along with attacker personas. This paper also investigates DDoS attacks technically and it is suggested that there is a need for a socio-technical approach to these attacks to investigate why they occur and the reasoning the attacker(s) could have for launching these attacks. This paper finds several motives behind DDoS attacks and discusses the profiles that attackers can be sorted into. Also discussed are the motives that attacker profiles can have for launching DDoS attacks. Although mitigation techniques are in place to control the damage a DDoS attack can cause to a company, if the motives can be addressed first, these attacks could be prevented. With the use of case studies, visualisations and tables, the motives behind DDoS attacks and attacker personas are presented.

Original languageEnglish
Title of host publicationDigital Transformation and Human Behavior- Innovation for People and Organisations
EditorsConcetta Metallo, Maria Ferrara, Alessandra Lazazzara, Stefano Za
PublisherSpringer Nature
Pages135-147
Number of pages13
ISBN (Electronic)9783030475390
ISBN (Print)9783030475383
DOIs
Publication statusPublished - 3 Nov 2020
EventAnnual Conference of the Italian Chapter of AIS , 2019 - Naples, Italy
Duration: 27 Sept 201928 Sept 2019

Publication series

NameLecture Notes in Information Systems and Organisation
Volume37
ISSN (Print)2195-4968
ISSN (Electronic)2195-4976

Conference

ConferenceAnnual Conference of the Italian Chapter of AIS , 2019
Country/TerritoryItaly
CityNaples
Period27/09/1928/09/19

Keywords

  • Cyberattacks
  • DDoS attacks
  • Motives
  • Profiles
  • Socio-technical

Fingerprint

Dive into the research topics of 'Motives behind ddos attacks'. Together they form a unique fingerprint.

Cite this