At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes

In this article, we study the political use of denial-of-service (DoS) attacks, a particular form of cyberattack that disables web services by flooding them with high levels of data traffic. We argue that websites in nondemocratic regimes should be especially prone to this type of attack, particularly around political focal points such as elections. This is due to two mechanisms: governments employ DoS attacks to censor regime-threatening information, while at the same time, activists use DoS attacks as a tool to publicly undermine the government’s authority. We analyze these mechanisms by relying on measurements of DoS attacks based on large-scale Internet traffic data. Our results show that in authoritarian countries, elections indeed increase the number of DoS attacks. However, these attacks do not seem to be directed primarily against the country itself but rather against other states that serve as hosts for news websites from this country.

[1]  Ruben Enikolopov,et al.  Social Media and Protest Participation: Evidence from Russia , 2016, Econometrica.

[2]  Yuyu Chen,et al.  The Impact of Media Censorship: 1984 or Brave New World? , 2019, American Economic Review.

[3]  Y. Zhukov,et al.  Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events? , 2019 .

[4]  Margaret E. Roberts Censored: Distraction and Diversion Inside China's Great Firewall , 2018 .

[5]  Staffan I. Lindberg,et al.  Regimes of the World (RoW): Opening New Avenues for the Comparative Study of Political Regimes , 2018 .

[6]  Margaret E. Roberts,et al.  How Sudden Censorship Can Increase Access to Information , 2017, American Political Science Review.

[7]  Alberto Dainotti,et al.  Millions of targets under attack: a macroscopic characterization of the DoS ecosystem , 2017, Internet Measurement Conference.

[8]  Margaret E. Roberts,et al.  From Liberation to Turmoil: Social Media And Democracy , 2017 .

[9]  Margaret E. Roberts,et al.  How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument , 2017, American Political Science Review.

[10]  Arjun S. Wilkins To Lag or Not to Lag?: Re-Evaluating the Use of Lagged Dependent Variables in Regression Analysis* , 2017, Political Science Research and Methods.

[11]  T. Holt,et al.  Exploring the Correlates of Individual Willingness to Engage in Ideologically Motivated Cyberattacks , 2017 .

[12]  C. Knutsen,et al.  Autocratic Elections: Stabilizing Tool or Force for Change? , 2017 .

[13]  Tiberiu Dragu Does Technology Undermine Authoritarian Governments ? , 2017 .

[14]  M. Truong,et al.  Silencing the messenger: Communication apps under pressure , 2016 .

[15]  A. Yildirim Muslim Democratic Parties in the Middle East: Economy and Politics of Islamist Moderation , 2016 .

[16]  Ryan Shirah Electoral authoritarianism and political unrest , 2016 .

[17]  Joseph K. Young,et al.  Repression, Education, and Politically Motivated Cyberattacks , 2016 .

[18]  Tadayoshi Kohno,et al.  Satellite: Joint Analysis of CDNs and Network-Level Interference , 2016, USENIX Annual Technical Conference.

[19]  Aiko Pras,et al.  A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements , 2016, IEEE Journal on Selected Areas in Communications.

[20]  Ulrich Dolata,et al.  Masses, Crowds, Communities, Movements: Collective Action in the Internet Age , 2016 .

[21]  A. Little Communication Technology and Protest , 2016, The Journal of Politics.

[22]  S. Milan Hacktivism as a Radical Media Practice , 2015 .

[23]  L. Tanczer Book review: the coming swarm: DDoS actions, hacktivism, and civil disobedience on the internet , 2015 .

[24]  Yonatan L. Morse The Politics of Uncertainty: Sustaining and Subverting Electoral Authoritarianism , 2015 .

[25]  Seva Gunitsky Corrupting the Cyber-Commons: Social Media as a Tool of Autocratic Stability , 2015, Perspectives on Politics.

[26]  Vern Paxson,et al.  An Analysis of China's "Great Cannon" , 2015 .

[27]  Marco Chiesa,et al.  Analysis of country-wide internet outages caused by censorship , 2011, IMC '11.

[28]  Gabriella Coleman Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous , 2014 .

[29]  Adam Senft,et al.  Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware , 2014, USENIX Security Symposium.

[30]  Jessica L. Beyer Expect Us: Online Communities and Political Mobilization , 2014 .

[31]  B. Valeriano,et al.  The dynamics of cyber conflict between rival antagonists, 2001–11 , 2014 .

[32]  N. Hassanpour Media Disruption and Revolutionary Unrest: Evidence From Mubarak's Quasi-Experiment , 2014 .

[33]  W. Wong,et al.  E-Bandits in Global Activism: WikiLeaks, Anonymous, and the Politics of No One , 2013, Perspectives on Politics.

[34]  Andreas Schedler The Politics of Uncertainty: Sustaining and Subverting Electoral Authoritarianism , 2013 .

[35]  Erik Melander,et al.  Introducing the UCDP Georeferenced Event Dataset , 2013 .

[36]  Margaret E. Roberts,et al.  How Censorship in China Allows Government Criticism but Silences Collective Expression , 2013, American Political Science Review.

[37]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[38]  A. Little Elections, Fraud, and Election Monitoring in the Shadow of Revolution , 2012 .

[39]  Katy E. Pearce,et al.  Networked Authoritarianism and Social Media in Azerbaijan , 2012 .

[40]  Dennis M. Murphy The Net Delusion: The Dark Side of Internet Freedom , 2012 .

[41]  Ronald J. Deibert,et al.  Cyclones in cyberspace: Information shaping and denial in the 2008 Russia–Georgia war , 2012 .

[42]  R. García CONSENT OF THE NETWORKED. The Worldwide Struggle for Internet Freedom , 2012 .

[43]  Peter Van Aelst,et al.  INTERNET AND SOCIAL MOVEMENT ACTION REPERTOIRES , 2010 .

[44]  Ronald J. Deibert,et al.  Liberation vs. Control: The Future of Cyberspace , 2010 .

[45]  J. V. Laer,et al.  INTERNET AND SOCIAL MOVEMENT ACTION REPERTOIRES: Opportunities and limitations , 2010 .

[46]  L. Diamond Liberation Technology , 2010 .

[47]  Kristian Skrede Gleditsch,et al.  The Geography of the International System: The CShapes Dataset , 2010 .

[48]  Jeffrey Carr,et al.  Inside Cyber Warfare: Mapping the Cyber Underworld , 2009 .

[49]  J. Gandhi,et al.  Elections Under Authoritarianism , 2009 .

[50]  S. Lindberg Democratization by elections : a new mode of transition , 2009 .

[51]  Jose Nazario,et al.  Politically Motivated Denial of Service Attacks , 2009 .

[52]  Paul Sturges,et al.  Access Denied: The Practice and Policy of Global Internet Filtering , 2008 .

[53]  Beatriz Magaloni Credible Power-Sharing and the Longevity of Authoritarian Rule , 2008 .

[54]  Joshua A. Tucker Enough! Electoral Fraud, Collective Action Problems, and Post-Communist Colored Revolutions , 2007, Perspectives on Politics.

[55]  Taylor C. Boas 17 WEAVING THE AUTHORITARIAN WEB The Control of Internet Use in Nondemocratic Regimes , 2006, How Revolutionary Was the Digital Revolution?.

[56]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[57]  Lucy Kralj Access denied. , 2005, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[58]  J. D. McCarthy,et al.  The use of newspaper data in the study of collective action , 2003 .

[59]  Tim Jordan,et al.  Activism!: Direct Action, Hacktivism and the Future of Society , 2004 .

[60]  J. Kavanagh Liberation technology , 1989 .

[61]  J. Singer Reconstructing the correlates of war dataset on material capabilities of states, 1816–1985 , 1988 .