f081a655b465f87c.tex
1: \begin{abstract}
2: 
3: Motivated by the impressive but diffuse scope of DDoS research and reporting,
4: we undertake a multistakeholder (joint industry-academic)
5: analysis to seek convergence across the best available
6: macroscopic views of the relative trends in two dominant classes
7: of attacks – direct-path attacks and reflection-amplification attacks.
8: We first analyze 24 industry reports to extract trends and (in)consistencies
9: across observations by commercial stakeholders in 2022.
10: 	We then analyze ten data sets spanning industry and academic sources,
11: across four years (2019-2023), to find and explain discrepancies based on data
12: sources, vantage points, methods, and parameters.  
13: Our method includes a new approach:  we share an aggregated list of
14: DDoS targets with industry players who return the results of joining
15: this list with their proprietary data sources to reveal gaps in visibility
16: of the academic data sources.  We use academic data sources to explore
17: an industry-reported relative drop in spoofed reflection-amplification
18: attacks in 2021-2022.  Our study illustrates the value, but also
19: the challenge, in independent validation of security-related 
20: properties of Internet infrastructure. 
21: Finally, we reflect on opportunities to facilitate greater
22: common understanding of the DDoS landscape.
23: We hope our results inform not only future
24: academic and industry pursuits but also emerging policy efforts
25: to reduce systemic Internet security vulnerabilities.
26: 
27: 
28: 
29: 
30: 
31: \end{abstract}
32: