Conventional countermeasures to Distributed Denial of Service (DDoS)
attacks typically focus on practices and rules for organizing a robust,
DDoS-resilient network which anticipates proactive cooperation of users.
Such measures involve widespread implementation cooperation and may be
difficult or problematic to enforce in a large organization.
Configurations of the invention employ the attacker's technique
preventatively against the attack to identify sources likely to be
employed for DDoS attacks. Crawlers scan web sites for identifying pages
likely to be exploited as launch pads by DDoS attackers. A scanner device
dispatches robots for sending probe messages from the launch pads which
emulate an actual attack. Each of the probe messages are sent to a known,
predetermined destination for determining identifying characteristics of
such a message. The identifying characteristics define a signature of
messages emanating from the launch pad. Such probe messages are tagged
with an identifying field or label, such as a predetermined address. The
signatures are then employed for comparison with other incoming message
traffic.