2015 DDoS Attack Trends and 2016 Outlook
|
|
- Derek Fletcher
- 6 years ago
- Views:
Transcription
1 CDNetworks 2015 DDoS Attack Trends and 2016 Outlook 2016, January CDNetworks Security Service Team
2 Table of Contents 1. Introduction Outline DDoS attack trends DDoS attack outlook for DDoS defense technology outlook for Conclusion <Public> 2 CopyrightcCDNetworks. All Rights Reserved.
3 1. Introduction CDNetworks, a global CDN service provider offering content delivery network (CDN) services and Cloud Security services including DDoS defense and web application firewall. This report analyzes DDoS attack types and trends collected by the CDNetworks Security Service Team in the course of providing DDoS defense services to customers and uses the analysis to predict and prepare for DDoS trends in The number of parameters may be small as the report addresses customers of CDNetworks' security service, but it draws on CDNetworks' experience of providing services to global customers including from the U.S., Europe, Singapore and Japan. As such, it is expected to be useful for understanding and forecasting DDoS attack trends. 2. Outline The number of DDoS attacks increased more than 200% compared to last year and the amount of DDoS attack traffic rose as well. The use of DNS (Domain Name System) and NTP (Network Time Protocol) Amplification mostly used between 2013 and 2014 was decreased but the frequency of SSDP (Simple Service Discovery Protocol) Amplification multiplied. Moreover, DDoS attacks turning servers into becoming zombies and DDoS attacks targeting vulnerabilities in Linux servers, increased in number. In 2014, DDoS attacks mainly targeted gaming companies but in 2015, the scope widened to threaten public institutions and financial companies as well. In particular, a European hacking group, DD4BC (DDoS for Bitcoin), attacked websites and services of local banks and large brokerages between June and July and there were a number of hacktivist attacks targeting government websites in different countries. <Public> 3 CopyrightcCDNetworks. All Rights Reserved.
4 3. DDoS attack trends 3.1 Annual DDoS attacks <Figure 1> Annual DDoS attacks The number of DDoS attacks increased by 29% from 2013 to 2014, and up by 118% from 2014 to The reasons behind the increasing number of DDoS attacks are due to diverse target groups coupled with the growing number of online service users and ease of launching attacks at low cost. 3.2 Monthly DDoS attacks Jan. Feb. Mar. Apr. May Jun. Jul. Aug. Sep. Oct. Nov. Dec <Figure 2> Monthly DDoS attacks <Public> 4 CopyrightcCDNetworks. All Rights Reserved.
5 70% of DDoS attacks during 2015 took place in the second quarter (23.3%) and the third quarter (47.6%). In particular, 113 DDoS attacks (25%) occurred in June when DD4BC was active in Korea and the number of attacks drastically decreased from September. This was due to a large number of DDoS proxy service platforms and C&C (Command & Control) servers which were blocked and removed by China's special regulations on Internet threats that came into effect on August Analysis of DDoS traffic size Under 1G 1G to 5G 5G to 10G 10G to 20G Over 20G % 30.4% 6.8% 11.2% 3.7% % 28.4% 14.4% 11.5% 5.8% % 33.6% 18.8% 10.6% 10.6% <Figure 3> Analysis of DDoS traffic size As shown by the analysis of DDoS traffic size, small attacks of less than 1G most frequently occurred between 2013 and 2014, but attacks in the 1G to 5G range occurred the most in Also, the average traffic size increased from previous years to the extent that attacks of 10G or above accounted for 20% of the total DDoS attacks. This trend is attributable to an increase in DDoS attacks using the UDP (User Datagram Protocol) and amplification attacks. <Public> 5 CopyrightcCDNetworks. All Rights Reserved.
6 3.4 Analysis of DDoS types HTTP 18.1% 16.4% 28.6% Amplification 0.4% 21.1% 31.7% UDP 36.3% 32.9% 39.3% SYN 10.1% 19.4% 16.4% ICMP 5.2% 3.6% 0.4% ETC 2.1% 10.1% 7.9% 0.0% 5.0% 10.0% 15.0% 20.0% 25.0% 30.0% 35.0% 40.0% 45.0% <Figure 4> Analysis of DDoS types The analysis shows that UDP flooding and amplification attacks increased while TCP dropped somewhat. Plus, there were only few ICMP attacks. 3.5 Frequency of amplification attacks SSDP NTP DNS Chargen % 34.4% 31.3% 1.6% % 19.1% 12.9% 3.4% <Figure 5> Frequency of amplification attacks In 2014, DNS, NTP and SSDP accounted for 30% respectively but in 2015, SSDP <Public> 6 CopyrightcCDNetworks. All Rights Reserved.
7 had the highest frequency, taking up to 64% of the total amplification attacks. There were also frequent attacks combining DNS, NTP and SSDP to generate a large amount of traffic as the number of exploitable reflectors decreased with DNS and NTP server patches. Moreover, this combined attack is a growing trend because of a DDoS proxy service Booter which makes it easy to generate all three types of attacks. 6.5% 37.3% Under 1G 30.7% 1G to 5G 5G to 10G Over 10G 25.5% <Figure 6> Distribution of traffic from amplification attacks in 2015 Attacks with traffic less than 1G occupied the smallest share of 6.5% and attacks of over 10G had the largest share of 37%. The average amount of traffic from amplification attacks in 2015 was 10.7 Gbp. <Public> 7 CopyrightcCDNetworks. All Rights Reserved.
8 4. DDoS attack outlook for Increase in average DDoS attack traffic (Unit: Mbps) <Figure 7> Annual average DDoS attack traffic The average amount of attack traffic is increasing with the growing number of amplification attacks and UDP-based attacks. In 2016, like last year, DDoS attacks between 10G and 50G are expected to increase in number. 4.2 Amplification attack trends Above all, NTP / DNS amplification attacks are expected to subside while combined attacks rather than single-type attacks increase. (For example, SSDP amplification + DNS amplification) The reasons are that many systems are being patched at the moment and the amount of traffic exploitable for attacks is decreasing. In order to generate highbandwidth traffic, there is no alternative but to launch combined attacks. SSDP amplification attacks that were most common in 2015 are expected to occupy a large share in 2016 as well. The number of devices connected to networks is increasing with the wide use of IoT (Internet of Things, and as IoT devices are often out of an administrator's reach, it is highly likely to be exploited for DDoS attacks. According to Gartner, the number of IoT devices was a mere 0.9 billion but is projected to escalate up to 26 billion by the year DDoS attacks using devices are therefore expected to continue for some time. <Public> 8 CopyrightcCDNetworks. All Rights Reserved.
9 Furthermore, SNMP (Simple Network Management Protocol), CharGen (Character Generator), QOTD (Quote Of The Day) and RIP (Routing Information Protocol) amplification attacks will continue to increase in number. 4.3 Increase in attacks using Booter Booter, also known as a DDoS attack proxy service or IP stresser, is spreading rapidly. It is a kind of DDoS as a Service, providing tools and zombies for attack at a low cost. This Booter became known to the world after DD4BC used it to attack the financial world between June and July of Attackers used to distribute malicious programs through many different channels, such as P2P and Torrent, infect PCs and use them to make an attack but with Booter, they can now launch a massive attack at small cost up to few tends of thousand KRW, Plus, attackers use Booter because it accepts bitcoin and it ensures that they can maintain anonymity. Booter enables a variety of attacks including amplification attacks, GET, SYN, XML-RPC and Slowloris. <Figure 8> A type of attack provided by booter.xyz 4.4 Increase in GET Flooding using cloud computing services The wide use of cloud computing services led to attacks using VM (Virtual Machine). <Public> 9 CopyrightcCDNetworks. All Rights Reserved.
10 As mentioned in the 2014 DDoS Attack Trends and Outlook for 2015 published in February 2015, DDoS attacks exploiting cloud computing services will continue for some time. DDoS attackers need to enable a large number of zombie PCs and botnets for effective attack, but it is not easy to infect many PCs and, furthermore, zombies become useless when users turn off PCs or install a vaccine. Attacks using the cloud have two advantages: 1 Easy to generate zombies In a cloud service, it is easy to use a range of IP addresses and as many VMs as they want within seconds upon the making of payments. It means that they do not need to go through the troublesome procedure of infecting the client using malicious code to create zombies. 2 Use zombies optimized for attack Attackers can efficiently generate a great deal of low-spec VMs optimized for attack at low cost. They can also choose the location that is ideal for their attack using cloud providers distributed around the world. Every type of attack with high performance and high-bandwidth resources is available, but GET or POST Flooding is expected to be the choice of attackers because, in general, cloud services make a charge based on the amount of VM, bandwidth and resources used. <Figure 9> Example of defense against DDoS attack using the cloud - dashboard <Public> 10 CopyrightcCDNetworks. All Rights Reserved.
11 The figure above is a dashboard that shows how CDNetworks Cloud Security Service addressed a cloud-based GET Flooding attack using WAF (Web Application Firewall) Javascript on December 11, As shown in the figure, most of the attacks were generated from Hosting Service (Cloud Service) IPs in a specific region. 5. DDoS defense technology outlook for Advancement of slow attack mitigation technology Slow attack is a type of attack that depletes system resources by sending GET or POST requests at a very slow rate. In the past, up to 100 GET requests were sent per minute but the number of requests per minute reduced down to three and over 100,000 attacker IP addresses make it impossible to tell the difference between normal connections and abnormal connections. In other words, it is unable to deal with this attack using the conventional threshold method. In order to deal with such a slow attack, companies use Set Cookie. <Figure 10> Defense mechanism using Set Cookie <Public> 11 CopyrightcCDNetworks. All Rights Reserved.
12 Set Cookie is a technology that allows a server to issue cookie for client requests to help identify bots and browsers. But as more and more bots recognize cookies, a technology using advanced Javascript is required to distinguish between bots and browsers. <Figure 11> Capabilities of DDoS Bots, Source: Incapsula According to the security service provider, Incapsula, about 30% of bots can recognize cookies and 0.8% can execute Javascript, meaning that the use of cookies can block 70 IP addresses and with Javascript, up to 99.2 IP addresses can be blocked in case of an attack using 100 zombies. As such, solutions using Javascript to block DDoS attacks as well as bots, and web firewall solutions combining Javascript and WAF signatures set a new trend in the security solution market. <Figure 12> CDNetworks Cloud Security WAF defense architecture <Public> 12 CopyrightcCDNetworks. All Rights Reserved.
13 5.2 Cloud based DDoS defense center The growing power of DDoS attack leads to the growth of DDoS defense center. CDNetworks is building a global DDoS defense center to ensure prompt service when facing an attack. <Figure 13> CDNetworks global DDoS defense center The following are required in responding to recent high-bandwidth amplification attacks: Inbound traffic control Handling of over 50G inbound traffic Eliminating the exposure of the origin IP Global DDoS defense center not only ensures the above, but also provides many benefits: Hide the origin IP to maintain security High-bandwidth service is capable of handling amplification attacks GSLB not only distributes attacks, but also relocates users to the nearest cache server to ensure rapid communication <Public> 13 CopyrightcCDNetworks. All Rights Reserved.
14 6. Conclusion DD4BC has swept the world and the attack that it launched in Korea was an SSDP amplification attack with traffic as small as 15G. However, the attack brought down numerous services and companies could not cope with it until it stopped. That is because their service structure was not flexible enough. Most companies have a network line with the bandwidth of 1G or 10G due to the high cost of traffic and use adequate inline network equipment, but no matter how advanced their equipment, they cannot deliver services in case of an attack with traffic higher than their network bandwidth. <Figure 14> DDoS defense mechanism using the cloud Moreover, DNS and web servers are always exposed to the public and it means that a level of scalability enough to migrate into a bigger network is required in order to secure services against the recent DDoS attacks. <Public> 14 CopyrightcCDNetworks. All Rights Reserved.
15 About CDNetworks CDNetworks is a global content delivery network (CDN) with fully integrated Cloud Security DDoS protection and web application firewall. Our mission is to transform the Internet into a secure, reliable, scalable, and high-performing Application Delivery Network. CDNetworks accelerates more than 40,000 websites and cloud services over a network of 200 global PoPs in established and emerging markets including China and Russia. We have been serving enterprise customers for 15 years across industries such as gaming, finance, ecommerce, high tech, manufacturing, and media. CDNetworks offices are located in the U.S., UK, South Korea, China, Japan, and Singapore. For more information, please visit: Website: Copyright Statement Copyright CDNetworks. All Rights Reserved. Copyright in this document is owned by CDNetworks, and you may not reproduce or distribute this document without the prior permission of CDNetworks. Information in this document is subject to change without notice. Global Offices US 1919 S. Bascom Avenue, Ste. 600, Campbell, CA EMEA 85 Gresham Street, London EC2V 7NQ Korea 2F, 37, Teheran-ro 8-gil, Gangnam-Gu, Seoul Japan Nittochi Nishi-shinjuku Building, 8th Floor, Nishishinjuku, Shinjuku-ku, Tokyo China F15-05 Tower B, Greenland Center, Science and Technology Business Area, Wangjing, Chaoyang District, Beijing, China, Tower A, High-Tech Bldg.900 Yishan Rd. Xuhui District, Shanghai, China Singapore 51 Cuppage Road, #06-07, Singapore <Public> 15 CopyrightcCDNetworks. All Rights Reserved.
Q Web Attack Analysis Report
Security Level Public CDNetworks Q4 2016 Web Attack Analysis Report 2017. 2. Security Service Team Table of Contents Introduction... 3 Web Attack Analysis... 3 Part I. Web Hacking Statistics... 3 Part
More informationCDNetworks DDoS Attack Trends and Outlook for February 2015 CDNetworks Security Service Team. Copyright 2015 CDNetworks
CDNetworks 2014 DDoS Attack Trends and Outlook for 2015 February 2015 CDNetworks Security Service Team Copyright 2015 CDNetworks 1. Introduction CDNetworks, a global CDN service provider, provides content
More informationXOR.DDoS Attack Analysis Report
Security Level Public CDNetworks XOR.DDoS Attack Analysis Report 30 th June, 2016 Security Service Team Sungjun Lee Table of Contents 1. Overview... 3 2. What is XOR.DDoS?... 3 2.1 XOR.DDoS Malware Infection
More information+ + Increased website traffic by 40% + + Reduced datacenter costs + + Improved scalability + + Better user experience, higher customer
CASE STUDY MYmovies.it Boosts the Performances of Italy s Second Largest Video Entertainment Website, After YouTube, Without Changes to Infrastructure or Increased Investments in Bandwidth At a Glance
More informationOpportunities, Challenges, and the Right Solution
WHITE PAPER EXTENDING YOUR WEB BUSINESS INTO CHINA Opportunities, Challenges, and the Right Solution Table of Contents Introduction: The Market that Cannot be Ignored 3 Understanding the Challenges Behind
More informationGlobal DDoS Threat Landscape
DDOS REPORT Global DDoS Threat Landscape OVERVIEW Overview The number of network layer attacks continued to fall in, the fourth consecutive quarterly drop since peaking in Q2 2016. After reaching a record
More informationIoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense
IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense DDoS Attacks Increasing in Size, Frequency & Complexity Arbor Networks WISR XII Largest attack
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 3 3RD QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q3 2017 4 DDoS
More information( ) 2016 NSFOCUS
NSFOCUS 2016 Q3 Report on DDoS Situation and Trends (2016-10-20) 2016 NSFOCUS Copyright 2016 NSFOCUS Technologies, Inc. All rights reserved. Unless otherwise stated, NSFOCUS Technologies, Inc. holds the
More informationImprove internet performance and reliability, resulting in faster application response times
WHITE PAPER ACCELERATE SAP APPLICATIONS WITH CDNETWORKS Improve internet performance and reliability, resulting in faster application response times Table of Contents Introduction 3 Strength of CDNetworks
More informationState of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager
State of the Internet Security Q2 2017 Mihnea-Costin Grigore Security Technical Project Manager Topics 1. Introduction 2. DDoS Attack Trends 3. Web Application Attack Trends 4. Spotlights 5. Resources
More informationCloud DNS. High Performance under any traffic conditions from anywhere in the world. Reliable. Performance
Cloud DNS High Performance under any traffic conditions from anywhere in the world Secure DNS System Reduce vulnerability to spoofing and distributed denial of service (DDoS) attacks Reliable Performance
More informationWHITE PAPER. DNS: Key Considerations Before Deploying Your Solution
WHITE PAPER DNS: Key Considerations Before Deploying Your Solution Table of Contents What is DNS? 3 Why Does DNS Matter? 4 Options for building a DNS infrastructure 5 How to Choose the Right DNS Infrastructure
More informationCloud DNS Phone: (877)
Cloud DNS Phone: (877) 937-4236 Email: info@cdnetworks.com CDNetworks Inc., 1500 Valley Vista Dr. Diamond Bar, CA 91765, USA Table of Content Introduction... 3 Cloud DNS Global Points of Presence...3 CDNetworks
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 1 1ST QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q1 2017 4 DDoS
More informationDistributed Denial of Service (DDoS)
Global Leader in DDoS Mitigation Threat Report Distributed Denial of Service (DDoS) Threat Report Q1 2017 456 Montgomery Street, Suite 800 San Francisco, CA 94104 USA +1 415 299 8550 Contents 1. Methodology...................
More informationAnti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 11 Date 2018-05-28 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationImperva Incapsula Product Overview
Product Overview DA T A SH E E T Application Delivery from the Cloud Whether you re running a small e-commerce business or in charge of IT operations for an enterprise, will improve your website security
More information2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015
2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 5, ISSUE 1 1ST QUARTER 2018 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q1 2018 4 DDoS
More informationWEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING
WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING A STRONG PARTNER COMPANY Link11 - longstanding security experience Link11 is a European IT security provider, headquartered in Frankfurt, Germany
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 4 4TH QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q4 2017 4 DDoS
More informationAn Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks
An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks abulletti@arbor.net Topics Covered The DDOS cyber threat and impacts Cyprus attacks trend in
More informationINTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
INTRODUCTION: DDOS ATTACKS 1 DDOS ATTACKS Though Denial of Service (DoS) and Distributed Denial of Service (DDoS) have been common attack techniques used by malicious actors for some time now, organizations
More informationIntroduction to DDoS Attacks
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter 2015 MCNC General Use v1.0 DDoS in the News July 2015 2015 MCNC General Use v1.0 DDoS
More informationA Survey of Defense Mechanisms Against DDoS Flooding A
DDoS Defense: Scope And A Survey of Defense Mechanisms Against DDoS Flooding Attacks IIT Kanpur IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER 2013 DDoS Defense: Scope And Outline
More informationEnterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE
Enterprise Overview Benefits and features of s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com This paper summarizes the benefits and features of s Enterprise plan. State of
More informationHongbo Yang, Xiaobing Sun, Richard Zhao
IP Chain-Gangs Hongbo Yang, Xiaobing Sun, Richard Zhao NSFOCUS, Inc. December 2018 2018 NSFOCUS About NSFOCUS NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers
More informationDDoS attack patterns across the APJ cloud market. Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ
DDoS attack patterns across the APJ cloud market Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ www.cloudsec.com/tw DDoS attacks from Q1 2014 to Q1 2016 Each dot represents an individual
More informationDoS Cyber Attack on a Government Agency in Europe- April 2012 Constantly Changing Attack Vectors
DoS Cyber Attack on a Government Agency in Europe- April 2012 Constantly Changing Attack Vectors 1 Table of Content Preamble...3 About Radware s DefensePro... 3 About Radware s Emergency Response Team
More informationCybersecurity. Anna Chan, Marketing Director, Akamai Technologies
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile Business devices and Continuity data collection. & Cybersecurity Anna Chan, Marketing Director,
More informationCisco Firepower with Radware DDoS Mitigation
Cisco Firepower with Radware DDoS Mitigation Business Decision Maker Presentation Eric Grubel VP Business development, Radware February 2017 DDoS in the news French hosting firm flooded with 1 Tbps traffic
More informationDDOS RESILIENCY SCORE (DRS) "An open standard for quantifying an Organization's resiliency to withstand DDoS attacks" Version July
DDOS RESILIENCY SCORE (DRS) "An open standard for quantifying an Organization's resiliency to withstand DDoS attacks" Version 1.01.01 17 July 2017... Text is available under the GNU Free Documentation
More informationArbor White Paper. DDoS: THE STAKES HAVE CHANGED. HAVE YOU? REVEALED: 3 dangerous myths about DDoS attacks
Arbor White Paper DDoS: THE STAKES HAVE CHANGED. HAVE YOU? REVEALED: 3 dangerous myths about DDoS attacks The findings of the latest annual Worldwide Infrastructure Security Report (WISR) by Arbor Networks
More informationHerding Cats. Carl Brothers, F5 Field Systems Engineer
Herding Cats Carl Brothers, F5 Field Systems Engineer Agenda Introductions Security is easy, right Trivia Protecting your apps, one layer at a time How to survive an Attack Time permitting F5 Networks,
More informationAnalisi degli attacchi DDOS e delle contromisure
Attacchi informatici: Strategie e tecniche per capire, prevenire e proteggersi dagli attacchi della rete Analisi degli attacchi DDOS e delle contromisure Alessandro Tagliarino 0 WHO IS ARBOR NETWORKS?
More informationImma Chargin Mah Lazer
Imma Chargin Mah Lazer How to protect against (D)DoS attacks Oliver Matula omatula@ernw.de #2 Denial of Service (DoS) Outline Why is (D)DoS protection important? Infamous attacks of the past What types
More informationExit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz Presented By : Richie Noble Distributed Denial-of-Service (DDoS) Attacks
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 5, ISSUE 2 2ND QUARTER 2018 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q2 2018 4 DDoS
More informationA custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74
Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market Abridged Version Rise of the DDoS Attack Spurs Demand for Comprehensive Solutions A custom excerpt from Frost & Sullivan s
More informationProlexic Attack Report Q4 2011
Prolexic Attack Report Q4 2011 Prolexic believes the nature of DDoS attacks are changing: they are becoming more concentrated and damaging. Packet-per-second volume is increasing dramatically, while attack
More informationWar Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert
War Stories from the Cloud Going Behind the Web Security Headlines Emmanuel Mace Security Expert The leading cloud platform for enabling secure, high-performing user experiences on any device, anywhere.
More informationWHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks
WHITE PAPER 2017 DDoS of Things SURVIVAL GUIDE Proven DDoS Defense in the New Era of 1 Tbps Attacks Table of Contents Cyclical Threat Trends...3 Where Threat Actors Target Your Business...4 Network Layer
More informationComprehensive datacenter protection
Comprehensive datacenter protection There are several key drivers that are influencing the DDoS Protection market: DDoS attacks are increasing in frequency DDoS attacks are increasing in size DoS attack
More informationDDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT
DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT 01. EXECUTIVE SUMMARY This report summarizes recent research on distributed denial of service (DDoS) attacks, which looks at data collated recently and
More informationWHITE PAPER. Minimizing Latency in Global Online Trading: Address the Middle Mile
WHITE PAPER Minimizing Latency in Global Online Trading: Address the Middle Mile TABLE OF CONTENTS Introduction: The Drive to Lower Latency... 3 Sources of Internet Latency... 4 The Solution: On-Demand
More informationArbor WISR XII The Stakes Have Changed. Julio Arruda V1.0
Arbor WISR XII The Stakes Have Changed Julio Arruda V1.0 Overview This presentation provides a quick view of the ATLAS collected information for the year of 2016, then focus in Latin America targeted DDoS,
More informationAKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.
CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success
More informationChapter 7. Denial of Service Attacks
Chapter 7 Denial of Service Attacks DoS attack: An action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU),
More informationThink You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.
Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help. www.home.neustar 02 Think You're Safe from DDos Attacks?
More informationSam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF
Sam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF Who am I? Sam Pickles Senior Engineer for F5 Networks WAF Specialist and general security type Why am I here? We get to see the pointy end of a lot of
More informationMulti-vector DDOS Attacks
Multi-vector DDOS Attacks Detection and Mitigation Paul Mazzucco Chief Security Officer August 2015 Key Reasons for Cyber Attacks Money and more money Large number of groups From unskilled to advanced
More informationThe Presence and Future of Web Attacks
Agenda The Presence and Future of Web Attacks Marco Fullin, CISSP Warning: This talk will be technical, chaotic and hurt Akamai Today Grow revenue opportunities with fast, personalized web experiences
More informationHOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL
HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE
More informationCOMPUTER NETWORK SECURITY
COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (7 th Week) 7. Denial-of-Service Attacks 7.Outline Denial of Service Attacks Flooding Attacks Distributed Denial of Service Attacks Application Based
More informationSYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet
SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document
More informationWar Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy
War Stories from the Cloud: Rise of the Machines Matt Mosher Director Security Sales Strategy The Akamai Intelligent Platform The Platform 175,000+ Servers 2,300+ Locations 750+ Cities 92 Countries 1,227+
More informationVodafone Global FACTS
Vodafone Global FACTS Stefanie Schmidt, Stefan Deckers July 2018 C1-Vodafone External C1-Vodafone External 2 Global FACTS Overview & Introduction Luxembourg Global Roamer Germany 23 Countries Overview
More informationInline DDoS Protection versus Scrubbing Center Solutions. Solution Brief
Inline DDoS Protection versus Scrubbing Center Solutions Solution Brief Contents 1 Scrubbing Center vs. Inline DDoS Inspection and Mitigation... 1 2 Scrubbing Center... 2 2.1 Scrubbing Center Architecture...
More informationRadware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Abstract...3 Understanding Online Business
More informationOpportunities for Exploiting Social Awareness in Overlay Networks. Bruce Maggs Duke University Akamai Technologies
Opportunities for Exploiting Social Awareness in Overlay Networks Bruce Maggs Duke University Akamai Technologies The Akamai Intelligent Platform A Global Platform: 127,000+ Servers 1,100+ Networks 2,500+
More informationDistributed Denial of Service (DDoS)
Global Leader in DDoS Mitigation Threat Report Distributed Denial of Service (DDoS) Threat Report Q2 2017 456 Montgomery Street, Suite 800 San Francisco, CA 94104 USA +1 415 299 8550 Contents 1. Methodology...................
More informationSamu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED
Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing
More informationCyber War Chronicles Stories from the Virtual Trenches
Cyber War Chronicles Stories from the Virtual Trenches Ron Winward Security Evangelist Radware, Inc. March 17, 2016 Background on the Radware Report Key Cyber Attack Trends for 2015-2016 Case Study: Look
More informationDemanding More From Your Enterprise CDN
Demanding More From Your Enterprise CDN Are you paying by the gigabyte for obsolete tech and old datacenters? A secure CDN uses state-of-the-art hardware, research, and technology. Redefine availability
More informationDENIAL OF SERVICE ATTACKS
DENIAL OF SERVICE ATTACKS Ezell Frazier EIS 4316 November 6, 2016 Contents 7.1 Denial of Service... 2 7.2 Targets of DoS attacks... 2 7.3 Purpose of flood attacks... 2 7.4 Packets used during flood attacks...
More informationBe certain. MessageLabs Intelligence: May 2006
Be certain MessageLabs Intelligence: May 2006 Introduction Welcome to the May edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for May 2006 to keep
More informationWeb Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates
Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last
More informationF5 Warsaw SOC. Kamil Woniak. Security Operations Manager, F5 Networks
F5 Warsaw SOC Kamil Woniak Security Operations Manager, F5 Networks k.wozniak@f5.com Agenda The Story of the SOC Threat intelligence & Research F5 Anti-Fraud, DDOS and WAF protection services Highlights
More informationDNS Security. Ch 1: The Importance of DNS Security. Updated
DNS Security Ch 1: The Importance of DNS Security Updated 8-21-17 DNS is Essential Without DNS, no one can use domain names like ccsf.edu Almost every Internet communication begins with a DNS resolution
More informationsnoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection
Snoc DDoS Protection Fast Secure Cost effective sales@.co.th www..co.th securenoc Introduction Snoc 3.0 Snoc DDoS Protection provides organizations with comprehensive protection against the most challenging
More informationDDOS-GUARD Q DDoS Attack Report
DDOS-GUARD Q4 2017 DDoS Attack Report 02 12,7% Number of attacks also dropped by 12,7% in comparison with same period in 2016 4613 Total number of DDoS attacks 36,8% Number of attacks dropped by 36.8%
More informationCheck Point DDoS Protector Introduction
Check Point DDoS Protector Introduction Petr Kadrmas SE Eastern Europe pkadrmas@checkpoint.com Agenda 1 (D)DoS Trends 2 3 4 DDoS Protector Overview Protections in Details Summary 2 (D)DoS Attack Methods
More informationF5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe
F5 comprehensive protection against application attacks Jakub Sumpich Territory Manager Eastern Europe j.sumpich@f5.com Evolving Security Threat Landscape cookie tampering Identity Extraction DNS Cache
More informationakamai s [state of the internet] / security
[Volume 2 / Number 2] akamai s [state of the internet] / security Q2 215 executive summary The Security Report has five research sections: Quarter-over-quarter and year-ago quarterly attack statistics
More informationddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks
ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks 2 WHAT IS A DDOS-ATTACK AND WHY ARE THEY DANGEROUS? Today's global network is a dynamically developing
More informationEnterprise D/DoS Mitigation Solution offering
Enterprise D/DoS Mitigation Solution offering About the Domain TCS Enterprise Security and Risk Management (ESRM) offers full services play in security with integrated security solutions. ESRM s solution
More informationComprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline
Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline PRESENTED BY: RICH BIBLE, EMEA SILVERLINE SA November 22, 2018 1 2018 F5 NETWORKS DDoS and Application Attack
More informationWHITE PAPER Hybrid Approach to DDoS Mitigation
WHITE PAPER Hybrid Approach to DDoS Mitigation FIRST LINE OF DEFENSE Executive Summary As organizations consider options for DDoS mitigation, it is important to realize that the optimal solution is a hybrid
More informationGlobal DDoS Measurements. Jose Nazario, Ph.D. NSF CyberTrust Workshop
Global DDoS Measurements Jose Nazario, Ph.D. jose@arbor.net NSF CyberTrust Workshop Quick Outline, Conclusions o Measurements - We re screwed o Observations - We know who o The wrong approach: point solutions
More informationMay 2014 Penta Security Systems Inc.
May 2014 Inc. Introduction The overall cloud computing environment is evolving at an in increasing rate. The effective and cost-efficient nature of cloud environments has been drawing attention of numerous
More informationSecuring Online Businesses Against SSL-based DDoS Attacks. Whitepaper
Securing Online Businesses Against SSL-based DDoS Attacks Whitepaper Table of Contents Introduction......3 Encrypted DoS Attacks...3 Out-of-path Deployment ( Private Scrubbing Centers)...4 In-line Deployment...6
More informationComputer
2011-2014 Computer 2014.12. Contents 1. 2011-2013 China Computer Export Trend Analysis... 3 1.1. 2011-2013 China Computer Export Quantity Trend Analysis... 3 1.2. 2011-2013 China Computer Export Amount
More informationEncrypted Traffic Security (ETS) White Paper
Encrypted Traffic Security (ETS) White Paper The rapid rise in encrypted traffic is changing the security landscape. As more organizations become digital, an increasing number of services and applications
More informationImperva Incapsula Website Security
Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as
More informationDoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action
DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action 1 Table of Content Preamble...3 About Radware s DefensePro... 3 About Radware s Emergency Response
More informationDNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER
BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER Introduction DDoS attacks are rapidly growing in magnitude and frequency every year. Just in the last year, attack rates have risen 132% (Q2
More informationERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016
Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds
More informationCloudflare Advanced DDoS Protection
Cloudflare Advanced DDoS Protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com
More informationPOSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ)
POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) ABRIDGED POSTAL & TELECOMMUNICATIONS SECTOR PERFORMANCE REPORT FOURTH QUARTER 2017 Disclaimer: This report has been prepared based
More informationAllot IoT Defense Solutions for Enterprises to Ensure IoT Service Continuity. Solution Brief
Allot IoT Defense Solutions for Enterprises to Ensure IoT Service Continuity Solution Brief Contents 1 Allot IoT Defense Solutions for Enterprises to Ensure IoT Service Continuity... 1 2 IoT Service Protection...
More informationThe Interactive Guide to Protecting Your Election Website
The Interactive Guide to Protecting Your Election Website 1 INTRODUCTION Cloudflare is on a mission to help build a better Internet. Cloudflare is one of the world s largest networks. Today, businesses,
More informationsoftware.sci.utah.edu (Select Visitors)
software.sci.utah.edu (Select Visitors) Web Log Analysis Yearly Report 2002 Report Range: 02/01/2002 00:00:0-12/31/2002 23:59:59 www.webtrends.com Table of Contents Top Visitors...3 Top Visitors Over Time...5
More informationRadware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper
SHARE THIS WHITEPAPER Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Understanding the Threat
More informationTHE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES
THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise
More informationTechnical White Paper June 2016
TLP:WHITE! Technical White Paper June 2016 GuidetoDDoSAttacks! Authored)by:) Lee)Myers,)Senior)Manager)of)Security)Operations) Christopher)Cooley,)Cyber)Intelligence)Analyst) This MultiCState Information
More informationWhy IPS Devices and Firewalls Fail to Stop DDoS Threats
Arbor White Paper Why IPS Devices and Firewalls Fail to Stop DDoS Threats How to Protect Your Data Center s Availability About Arbor Networks Arbor Networks, Inc. is a leading provider of network security
More informationIntrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks
Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial
More informationAnti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationA10 DDOS PROTECTION CLOUD
DATA SHEET A10 DDOS PROTECTION CLOUD A10 Networks provides full spectrum DDoS defenses. This includes multi-vector protection from attacks of any type to ensure the availability of enterprise business
More information