Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire?

Journal of Information, Communication and Ethics in Society 15 (1):90-104 (2017)
  Copy   BIBTEX

Abstract

Purpose This paper aims to examine whether there are morally defensible reasons for using or operating websites that offer distributed denial-of-service attacks on a specified target to users for a price. Booters have been linked to some of the most powerful DDoS attacks in recent years. Design/methodology/approach The authors identify the various parties associated with booter websites and the means through which booters operate. Then, the authors present and evaluate the two arguments that they claim may be used to justify operating and using booters: that they are a useful tool for testing the ability of networks and servers to handle heavy traffic, and that they may be used to perform DDoS attacks as a form of civil disobedience on the internet. Findings The authors argue that the characteristics of existing booters disqualify them from being morally justified as network stress testing tools or as a means of performing civil disobedience. The use of botnets that include systems without the permission of their owners undermines the legitimacy of both justifications. While a booter that does not use any third-party systems without permission might in principle be justified under certain conditions, the authors argue that it is unlikely that any existing booters meet these requirements. Practical/implications Law enforcement agencies may use the arguments presented here to justify shutting down the operation of booters, and so reduce the number of DDoS attacks on the internet. Originality/value The value of this work is in critically examining the potential justifications for using and operating booter websites and in further exploring the ethical aspects of using DDoS attacks as a form of civil disobedience.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,060

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Hacktivism: On the Use of Botnets in Cyberattacks.Marco Deseriis - 2017 - Theory, Culture and Society 34 (4):131-152.
Investigation of vulnerabilities in implementation of crypto library used by OpenVPN for IPV6 deployment.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (4):1-13.
A Duty to Resist: When Disobedience Should Be Uncivil.Candice Delmas - 2018 - New York, USA: Oxford University Press.
Digital Forensics.Stefan Meier - 2018 - In Wolff Heintschel von Heinegg, Robert Frau & Tassilo Singer (eds.), Dehumanization of Warfare: Legal Implications of New Weapon Technologies. Springer Verlag. pp. 129-145.

Analytics

Added to PP
2019-09-04

Downloads
31 (#724,843)

6 months
5 (#1,035,390)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

David M. Douglas
University of Queensland (PhD)

Citations of this work

No citations found.

Add more citations

References found in this work

Civil disobedience online.Mathias Klang - 2004 - Journal of Information, Communication and Ethics in Society 2 (2):75-83.

Add more references