A set of attackers use a set of vulnerable
intermediary systems to attack a set of victims. Examples include a
Web-based attack causing thousands of browsers used by users at sites all
around the world to attack a single victim site, a set of simultaneous
attacks by a coordinated group of attackers to try to overwhelm defenses,
and an attack where thousands of intermediaries were fooled into trying to
gain access to a victim site.
Complexity: Devising DCAs appears to be simple while tracing a DCA to a
source can be quite complex. Early results indicate that tracking a DCA to
a source is exponential in the number of intermediaries involved, while
detecting a high-volume DCA appears to be straightforward.