CDNetworks DDoS Attack Trends and Outlook for February 2015 CDNetworks Security Service Team. Copyright 2015 CDNetworks
|
|
- Sharyl Newman
- 5 years ago
- Views:
Transcription
1 CDNetworks 2014 DDoS Attack Trends and Outlook for 2015 February 2015 CDNetworks Security Service Team Copyright 2015 CDNetworks
2 1. Introduction CDNetworks, a global CDN service provider, provides content delivery network (CDN) service, as well as DDoS defense services based on its large capacity international network lines and security technology capabilities, such as Secured Hosting and Cloud Security. This report analyzes information on a variety of DDoS attack types and trends collected in the course of providing Secured Hosting and Cloud Security, its DDoS defense service suite based on traffic bypass technology, to customers. Furthermore, this report uses the results of this analysis to share the information required to minimize damage from DDoS attacks by predicting and preparing for DDoS attack trends for This report contains DDoS attack trends for 2014, as well as the outlook and recommended countermeasures for While it primarily addresses the needs of CDNetworks security service customers, this report draws on CDNetworks experience in providing services to global customers, including from the U.S., Europe and Japan. As such, it is expected to provide useful resources for the general reader in understanding past trends and forecasting the future of DDoS attacks. 2. Summary DDoS attacks were more powerful and detailed in 2014 than the preceding year. The DDoS attacks of amplification type that appeared in the second half of 2013 became more powerful and diverse in type, while the slow L7-type attacks became slower and more detailed. Significantly, network time protocol (NTP) amplification attack replaced the existing maximum traffic of 300Gbps with 400Gbps in Increase in the number of DDoS attack cases The number of DDoS attacks in 2014 was 208, up 29% from the 161 posted in the preceding year. This is primarily due to the increase in the frequency of NTP amplification attacks and simple service discovery protocol (SSDP) amplification attacks, which had shown a very low occurrence frequency in the past. This rise has meant that, as a consequence, there has been a rise in the overall number and total traffic of DDoS attacks. A sharp rise in amplification attacks The number of amplification attacks was 64 in 2014, compared to just one in 2013, showing a 64-fold increase. By attack type, there were 21 simple service discovery protocol (SSDP) amplification attacks, 20 domain name system (DNS) amplification attacks, 22 NTP amplification attacks and 1 CharGen amplification attack, indicating that not only the number of occurrences is increasing, but that the type of amplification attacks is also diversifying. Increase in large-scale attacks 2
3 As for the number of DDoS attacks in 2014 by size, attacks between 10G and 20G increased by 33.3%, while larger attacks of 20G or above increased by 100%. The rising frequency of larger attacks is complicating efforts to defend attacks using the conventional network infrastructure possessed by the individual businesses Major DDoS Issues Date Feb Feb Mar Apr May 2014 May 2014 Jun Jul Jun Aug Sep Oct Nov Description 400Gbps DDoS, the largest scale ever (France) Bitcoin failure due to DDoS attacks 160,000 vulnerable WordPress-based sites are exploited as DDoS zombies NTP amplification attacks exploiting set-top boxes Chinese hackers target 220 Vietnamese sites with DDoS attacks, causing the network to be down for 3 days DDoS attacks through the infection of Linux servers (Elasticsearch vulnerability, iptables) A site relating to the opening of Brazil World Cup brought down by a DDoS attack A popular Korean online soccer game brought down by a DDoS attack Attack launched on Amazon servers exploiting the Elasticsearch vulnerability The servers of Sony PlayStation Network (PSN) brought down by a DDoS attack The closed social media site Ello brought down by a DDoS attack A large Korean domain registration agency s service suffers a failure by a DDoS attack Korean ISP DNS server suffers a failure due to a DDoS attack This year we saw that the defense for DNS servers is as important as that for high-traffic lines. As DNS uses user datagram protocol (UDP), it is not easy for DNS servers to defend against DDoS attacks. This is why we have provided safer services by increasing servers through ANYCAST methodology. Nevertheless, the need for protecting DNS servers has emerged as a critical issue following two high-profile service failures in Korea. In addition, we also saw several new types of attack, in addition to existing attacks that exploit zombie systems or vulnerabilities. We provide more details on these new types of attack in DDoS Outlook for 2015, below. The section below explores the trends of DDoS attacks based on our experience of defending systems against DDoS attacks through our Secured Hosting and Cloud Security Service in 2013 and
4 4. DDoS Attack Trend 2013 vs The frequency of DDoS attacks by year There were 208 cases of DDoS attacks in 2014, up 29% from This is primarily because there was an increase in the frequency of NTP amplification attacks and simple service discovery protocol (SSDP) amplification attacks, which had shown a very low occurrence frequency in the past, consequently increasing the overall number and traffic of DDoS attacks. 4.2 Analysis of DDoS attacks by month The graph shows DDoS attacks peaking in June. The period saw the highest frequency of both DNS amplification and NTP amplification attacks. The first SSDP amplification attack was detected on November 11. Following that, a total of 21 SSDP amplification attacks 4
5 occurred, with the maximum traffic of the attack being 14Gbps. In addition, a combined attack of DNS, NTP and SSDP generated a maximum traffic of 32Gbps. 4.3 Analysis of DDoS traffic size As shown by the analysis of DDoS traffic size, small attacks of less than 1G occurred the most frequently. Attacks of 10G or above also saw an increase in frequency, while the frequency of larger attacks of 20G or above doubled from the previous year. This trend is attributable to the increase in average traffic and maximum traffic by amplification attacks. 4.4 Analysis by type 5
6 According to the result of analysis by type, UDP flooding showed the highest frequency, continuing the trend seen in What is notable is the increase in amplification attacks. While 2013 saw only one DNS amplification attack occur, in 2014 there was a total of 64 DNS, NTP, and SSDP attacks. Furthermore, there were frequent attacks combining the three types. 4.5 Frequency of amplification attacks by type From November 2013, there were 21 SSDP amplification attacks, 22 NTP attacks, 20 DNS attacks and 1 CharGen attack. The traffic of DNS amplification was able to be slightly reduced with the use of extensive 6
7 patching, while NTP amplification remained as powerful as before. As to SSDP, the packet per second (PPS) for an IP was very low, as it occurs across a very large number of devices. This shows that it is impossible to defend the attack with the threshold for UDP. As shown below, amplification attacks occur frequently around the world. <Worldwide amplification attacks. Source: Digital Attack Map> 4.6. Analysis of the origin of DDoS attacks According to the result of querying 20,000 IPs, China and the U.S. were the two most frequently used sites for zombie systems. South Korea saw a slight decline from 12% in 2013 to 10% in Given that our services are provided to the global market, however, this figure is still high. 7
8 4.7. Analysis by type of business The types of business that received the most DDoS attacks were, in descending order: games (39%), education (26%) and community (13%). DDoS attacks on game companies in the global market remain very active, with Korean game companies becoming the main target of DDoS attacks as well. It is also understood that the range of the targets for DDoS attack is gradually expanding to include education, community, social commerce and public agencies. 8
9 DDoS Outlook 5.1 Outlook for amplification attacks Amplification attacks are also known as 'distributed reflector denial of service (DRDOS). This attack method involves attacking targets by utilizing vulnerable systems as 'zombies' by exploiting the vulnerabilities of specific protocols (DNS, NTP, SSDP, CharGen, SNMP). This type of attack can easily generate traffic of over 50G. In 2014, it generated traffic of up to 400G. The section below explores the types of DDoS attacks that are expected to increase or decrease in <Amplification attacks structure> Decline in the traffic of NTP and DNS amplification attacks The traffic generated by NTP on a single server is very high, with over 1G. For this reason, NTP operating companies have applied many patches, which has acted to significantly reduce the number of vulnerable systems (reflection list) 9
10 Globally, however, NTP amplification attacks are still taking place at the threatening traffic level of 50G-100G. At present, there are around 4,100 NTP reflectors in South Korea Increase in SSDP amplification attacks There are numerous devices that can be exploited for SSDP amplification. <Source: ShadowServer. Open SSDP in the world> According to the information from ShadowServer Foundation, China is the country with the most open SSDPs, followed by the U.S. and South Korea. OPEN SSDP TOP 10 Country Count China 4,800,000 USA 1,500,000 South Korea 1,100,000 Argentina 758,000 Russia 507,000 Japan 425,000 Brazil 399,000 Taiwan 346,000 India 305,000 Ukraine 298,000 The larger reflector list leads to a lower packet per second (PPS) for each device, which doesn t need to be increased. As a consequence, it is very difficult to defend against attacks by using the UDP threshold. 10
11 In addition, the traffic from a single IP is low and there are unmanaged devices using SSDP. It is therefore anticipated that SSDP amplification attacks will generate large traffic for the foreseeable future, continuing the trend seen in Increase in CharGen amplification attacks CharGen is an abbreviation of Character Generator and uses TCP/UDP Port 19. Attackers use UDP to change IP. According to the US-CERT (United States Computer Emergency Readiness Team), CharGen can amplify fold, and there are around 60,000 vulnerable servers in the world, including around 2,100 in South Korea. In addition, with global amplification traffic of up to around 58G occurring, companies are at risk of having their reputation and sales damaged unless they prepare thoroughly for the attacks. <State of CharGen amplification attacks. Source: Digital Attack Map> 5.2 Slow attacks that are even slower and attacks using the cloud A slow attack is a method of depleting system resources by requesting GET or POST attacks more slowly. Rather than requesting 100 times per minute, such attacks have recently become slower at 10 times per minute or even 3 times per minute, which makes it more difficult to differentiate abnormal from normal access. In addition, recent slow attacks use more IPs than in the past. Indeed, according to analysis of IPs, hackers tend to exploit the cloud in their attack, particularly as the cloud service market grows. Advantages of attacks using the cloud 1 Easy to generate zombies In a cloud service, it is easy to generate many VMs within seconds solely by using a credit card or deferred payment, with the generated VMs then used as zombie systems. This means attackers can skip the procedure for infecting the client by using malicious code to create zombie systems. 11
12 2 Zombie systems secured around the world at minimal cost Attackers can significantly reduce their costs by creating low-spec VMs with low memory and low disk capacity, which are optimized for attacks. They can also secure VMs to match the location of their target by using cloud providers distributed around the world. Attackers use many IPs to avoid the way that most security systems block attacks using the threshold based on a single IP. Many continuous IP addresses of cloud service providers can be found through the extraction of the attacking IPs. <Figure. GET/POST attacks using cloud service> 5.3 Script-based L7 attacks In April 2014, Incapsula, a cloud-based security service provider, announced that there was a large L7 DDoS attack exploiting the XSS vulnerability of Chinese video streaming web pages. When a user watches a video, one GET request is made to an arbitrarily defined target per second. If 10,000 users watch the video, 10,000 GET requests will take place per second. <POC TOOL> A customer (in the games industry) of CDNetworks Secured Hosting service also experienced a similar attack. In this attack, around 160,000 IPs from overseas were used to 12
13 make GET requests. The attack was easily defended as it used the same UserAgent, but this could have led to bigger trouble if we did not conduct analysis on L7 attacks with experience of it. 5.4 Increase in zombie PCs and mobile traffic with the advent of Giga Wi-Fi band Giga Wi-Fi is around three times faster than existing Wi-Fi. If a line is supported, PCs and mobile devices that are released these days can generate traffic of 500M. It is an immutable law that the more developed lines and hardware become, the greater the DDoS traffic. 6. Things You Need to Mitigate a DDoS Attack 6.1 Network and cloud infrastructure Recent DDoS attacks can easily generate traffic of 50G, and there are also many larger attacks that have generated 100G. To respond to DDoS attacks, you need to secure the capacity of over 100G, as well as cloudbased infrastructure that enables you to accommodate users from various regions in the global market. You also need multiple high-performance servers to withstand incoming attacks. 6.2 Anti-DDoS (L3, L4, L7) Devices As the types of attacks diversify, you need to get prepared for L3, L4 and L7 attacks in order to respond to any attack without a problem. You need to prepare for Get, POST, and slow attacks by implementing an L7 switch or other defense systems, in addition to anti-ddos devices. 13
14 6.3 Operators The most important factor in every security organization is labor. It is important to maintain the system 24x7x365 as DDoS attacks can take place any time and in any form. However, it is not easy for individual businesses to have their own stationed DDoS experts and, where such resources do exist, many lack sufficient technical capabilities to analyze the latest DDoS trends and generate actionable signatures from the result of their analysis. If businesses cannot afford to have their own personnel with expertise in the latest attack technologies, they need to consider outsourcing security to external experts. 6.4 Conclusion It is estimated to take about USD 3 million to meet all the above-mentioned requirements, and this is too much for individual businesses to meet. However, the possible damages from an attack in a defenseless state would be significantly greater than the costs, and thus businesses need to find alternative ways to finance their defense. CDNetworks provides DDoS defense service based on cloud, with other suppliers in the industry also providing similar services. If businesses utilize these outsource services efficiently according to their situation and need, they will be able to protect their infrastructure and secure business continuity as they can benefit from security experts and large-scale infrastructure at a reasonable price. 14
15 2014 DDoS Attack Trend and Outlook for 2015 Copyright Statement Copyright CDNetworks. All Rights Reserved. Copyright in this document is owned by CDNetworks, and you may not reproduce or distribute this document without the prior permission of CDNetworks. Information in this document is subject to change without notice. Inquiry on report and service: Business & Marketing Team, CDNetworks CDNetworks Global Offices Korea Handong Bldg. 2F, 37, Teheran-ro 8-gil, Gangnam-gu, Seoul Japan Nittochi Nishi-Shinjuku Building, 8th Floor, , Nishishinjuku, Shinjuku-ku, Tokyo China Room No.A-1502, Keijidalou, 900 Yi Shan Road, Shanghai
16 Singapore 10 Hoe Chiang Road #16-03 Keppel Towers, Singapore (Ext) 899 US 441 W. Trimble Road San Jose, CA EMEA Juxon House, 100 St Paul s Churchyard, London, EC4M 8BU Tel:
2015 DDoS Attack Trends and 2016 Outlook
CDNetworks 2015 DDoS Attack Trends and 2016 Outlook 2016, January CDNetworks Security Service Team Table of Contents 1. Introduction... 3 2. Outline... 3 3. DDoS attack trends... 4 4. DDoS attack outlook
More informationXOR.DDoS Attack Analysis Report
Security Level Public CDNetworks XOR.DDoS Attack Analysis Report 30 th June, 2016 Security Service Team Sungjun Lee Table of Contents 1. Overview... 3 2. What is XOR.DDoS?... 3 2.1 XOR.DDoS Malware Infection
More informationCloud DNS Phone: (877)
Cloud DNS Phone: (877) 937-4236 Email: info@cdnetworks.com CDNetworks Inc., 1500 Valley Vista Dr. Diamond Bar, CA 91765, USA Table of Content Introduction... 3 Cloud DNS Global Points of Presence...3 CDNetworks
More informationQ Web Attack Analysis Report
Security Level Public CDNetworks Q4 2016 Web Attack Analysis Report 2017. 2. Security Service Team Table of Contents Introduction... 3 Web Attack Analysis... 3 Part I. Web Hacking Statistics... 3 Part
More informationWHITE PAPER. DNS: Key Considerations Before Deploying Your Solution
WHITE PAPER DNS: Key Considerations Before Deploying Your Solution Table of Contents What is DNS? 3 Why Does DNS Matter? 4 Options for building a DNS infrastructure 5 How to Choose the Right DNS Infrastructure
More information( ) 2016 NSFOCUS
NSFOCUS 2016 Q3 Report on DDoS Situation and Trends (2016-10-20) 2016 NSFOCUS Copyright 2016 NSFOCUS Technologies, Inc. All rights reserved. Unless otherwise stated, NSFOCUS Technologies, Inc. holds the
More informationAn Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks
An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks abulletti@arbor.net Topics Covered The DDOS cyber threat and impacts Cyprus attacks trend in
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 3 3RD QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q3 2017 4 DDoS
More informationImprove internet performance and reliability, resulting in faster application response times
WHITE PAPER ACCELERATE SAP APPLICATIONS WITH CDNETWORKS Improve internet performance and reliability, resulting in faster application response times Table of Contents Introduction 3 Strength of CDNetworks
More informationGlobal DDoS Threat Landscape
DDOS REPORT Global DDoS Threat Landscape OVERVIEW Overview The number of network layer attacks continued to fall in, the fourth consecutive quarterly drop since peaking in Q2 2016. After reaching a record
More informationProlexic Attack Report Q4 2011
Prolexic Attack Report Q4 2011 Prolexic believes the nature of DDoS attacks are changing: they are becoming more concentrated and damaging. Packet-per-second volume is increasing dramatically, while attack
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 1 1ST QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q1 2017 4 DDoS
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 5, ISSUE 1 1ST QUARTER 2018 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q1 2018 4 DDoS
More informationWHITE PAPER. Minimizing Latency in Global Online Trading: Address the Middle Mile
WHITE PAPER Minimizing Latency in Global Online Trading: Address the Middle Mile TABLE OF CONTENTS Introduction: The Drive to Lower Latency... 3 Sources of Internet Latency... 4 The Solution: On-Demand
More informationCybersecurity. Anna Chan, Marketing Director, Akamai Technologies
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile Business devices and Continuity data collection. & Cybersecurity Anna Chan, Marketing Director,
More information+ + Increased website traffic by 40% + + Reduced datacenter costs + + Improved scalability + + Better user experience, higher customer
CASE STUDY MYmovies.it Boosts the Performances of Italy s Second Largest Video Entertainment Website, After YouTube, Without Changes to Infrastructure or Increased Investments in Bandwidth At a Glance
More informationIoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense
IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense DDoS Attacks Increasing in Size, Frequency & Complexity Arbor Networks WISR XII Largest attack
More informationDDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT
DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT 01. EXECUTIVE SUMMARY This report summarizes recent research on distributed denial of service (DDoS) attacks, which looks at data collated recently and
More informationA custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74
Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market Abridged Version Rise of the DDoS Attack Spurs Demand for Comprehensive Solutions A custom excerpt from Frost & Sullivan s
More informationState of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager
State of the Internet Security Q2 2017 Mihnea-Costin Grigore Security Technical Project Manager Topics 1. Introduction 2. DDoS Attack Trends 3. Web Application Attack Trends 4. Spotlights 5. Resources
More informationDoS Cyber Attack on a Government Agency in Europe- April 2012 Constantly Changing Attack Vectors
DoS Cyber Attack on a Government Agency in Europe- April 2012 Constantly Changing Attack Vectors 1 Table of Content Preamble...3 About Radware s DefensePro... 3 About Radware s Emergency Response Team
More informationDistributed Denial of Service (DDoS)
Global Leader in DDoS Mitigation Threat Report Distributed Denial of Service (DDoS) Threat Report Q1 2017 456 Montgomery Street, Suite 800 San Francisco, CA 94104 USA +1 415 299 8550 Contents 1. Methodology...................
More informationCloud DNS. High Performance under any traffic conditions from anywhere in the world. Reliable. Performance
Cloud DNS High Performance under any traffic conditions from anywhere in the world Secure DNS System Reduce vulnerability to spoofing and distributed denial of service (DDoS) attacks Reliable Performance
More informationArbor White Paper. DDoS: THE STAKES HAVE CHANGED. HAVE YOU? REVEALED: 3 dangerous myths about DDoS attacks
Arbor White Paper DDoS: THE STAKES HAVE CHANGED. HAVE YOU? REVEALED: 3 dangerous myths about DDoS attacks The findings of the latest annual Worldwide Infrastructure Security Report (WISR) by Arbor Networks
More informationAnti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 11 Date 2018-05-28 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationComputer
2011-2014 Computer 2014.12. Contents 1. 2011-2013 China Computer Export Trend Analysis... 3 1.1. 2011-2013 China Computer Export Quantity Trend Analysis... 3 1.2. 2011-2013 China Computer Export Amount
More informationDNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER
BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER Introduction DDoS attacks are rapidly growing in magnitude and frequency every year. Just in the last year, attack rates have risen 132% (Q2
More informationINTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
INTRODUCTION: DDOS ATTACKS 1 DDOS ATTACKS Though Denial of Service (DoS) and Distributed Denial of Service (DDoS) have been common attack techniques used by malicious actors for some time now, organizations
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 5, ISSUE 2 2ND QUARTER 2018 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q2 2018 4 DDoS
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 4 4TH QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q4 2017 4 DDoS
More informationCOPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1
COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1 Worldwide Infrastructure Security Report Highlights Volume XIII C F Chui, Principal Security Technologist COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 2 Overview This presentation
More informationSYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet
SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document
More informationDDoS attack patterns across the APJ cloud market. Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ
DDoS attack patterns across the APJ cloud market Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ www.cloudsec.com/tw DDoS attacks from Q1 2014 to Q1 2016 Each dot represents an individual
More informationEnterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE
Enterprise Overview Benefits and features of s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com This paper summarizes the benefits and features of s Enterprise plan. State of
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 3, ISSUE 3 3RD QUARTER 2016 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q3 2016 4 DDoS
More informationWar Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy
War Stories from the Cloud: Rise of the Machines Matt Mosher Director Security Sales Strategy The Akamai Intelligent Platform The Platform 175,000+ Servers 2,300+ Locations 750+ Cities 92 Countries 1,227+
More informationWEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING
WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING A STRONG PARTNER COMPANY Link11 - longstanding security experience Link11 is a European IT security provider, headquartered in Frankfurt, Germany
More informationHongbo Yang, Xiaobing Sun, Richard Zhao
IP Chain-Gangs Hongbo Yang, Xiaobing Sun, Richard Zhao NSFOCUS, Inc. December 2018 2018 NSFOCUS About NSFOCUS NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers
More informationImperva Incapsula Survey: What DDoS Attacks Really Cost Businesses
Survey Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses BY: TIM MATTHEWS 2016, Imperva, Inc. All rights reserved. Imperva and the Imperva logo are trademarks of Imperva, Inc. Contents
More informationSOTI SUMMER [state of the internet] / security ATTACK SPOTLIGHT
SOTI SUMMER 2018 [state of the internet] / security ATTACK SPOTLIGHT State of the Internet / Attack Spotlight ATTACK SPOTLIGHT Memcached 1.0 OVERVIEW Earlier this year, Akamai mitigated the largest DDoS
More informationExit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz Presented By : Richie Noble Distributed Denial-of-Service (DDoS) Attacks
More informationDRAFT. Measuring KSA Broadband. Meqyas, Q Report
DRAFT Measuring KSA Broadband Meqyas, Q3 218 Report In 217, the CITC in partnership with SamKnows launched a project to measure internet performance. The project, named Meqyas, gives internet users in
More informationCloudflare Advanced DDoS Protection
Cloudflare Advanced DDoS Protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com
More informationMulti-vector DDOS Attacks
Multi-vector DDOS Attacks Detection and Mitigation Paul Mazzucco Chief Security Officer August 2015 Key Reasons for Cyber Attacks Money and more money Large number of groups From unskilled to advanced
More informationGLOBAL MOBILE PAYMENT METHODS: FIRST HALF 2016
PUBLICATION DATE: OCTOBER 2016 PAGE 2 GENERAL INFORMATION I PAGE 3 KEY FINDINGS I PAGE 4-8 TABLE OF CONTENTS I PAGE 9 REPORT-SPECIFIC SAMPLE CHARTS I PAGE 10 METHODOLOGY I PAGE 11 RELATED REPORTS I PAGE
More informationsnoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection
Snoc DDoS Protection Fast Secure Cost effective sales@.co.th www..co.th securenoc Introduction Snoc 3.0 Snoc DDoS Protection provides organizations with comprehensive protection against the most challenging
More informationPhishing Activity Trends Report August, 2005
Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial
More informationAKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.
CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success
More informationTHE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES
THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise
More informationNigerian Telecommunications (Services) Sector Report Q3 2016
Nigerian Telecommunications (Services) Sector Report Q3 2016 24 NOVEMBER 2016 Telecommunications Data The telecommunications data used in this report were obtained from the National Bureau of Statistics
More informationOpportunities, Challenges, and the Right Solution
WHITE PAPER EXTENDING YOUR WEB BUSINESS INTO CHINA Opportunities, Challenges, and the Right Solution Table of Contents Introduction: The Market that Cannot be Ignored 3 Understanding the Challenges Behind
More informationWorld Broadband Statistics: A Short Report from Global Broadband Statistics
World Broadband Statistics: A Short Report from Global Broadband Statistics Q1 2012 June 2012 Point Topic Ltd 73 Farringdon Road London EC1M 3JQ, UK Tel. +44 (0) 20 3301 3305 Email bbus@point-topic.com
More informationakamai s [state of the internet] / security
[Volume 2 / Number 2] akamai s [state of the internet] / security Q2 215 executive summary The Security Report has five research sections: Quarter-over-quarter and year-ago quarterly attack statistics
More informationBe certain. MessageLabs Intelligence: May 2006
Be certain MessageLabs Intelligence: May 2006 Introduction Welcome to the May edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for May 2006 to keep
More informationNigerian Telecommunications Sector
Nigerian Telecommunications Sector SUMMARY REPORT: Q4 and full year 2015 NATIONAL BUREAU OF STATISTICS 26th April 2016 Telecommunications Data The telecommunications data used in this report were obtained
More informationImperva Incapsula Product Overview
Product Overview DA T A SH E E T Application Delivery from the Cloud Whether you re running a small e-commerce business or in charge of IT operations for an enterprise, will improve your website security
More informationThink You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.
Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help. www.home.neustar 02 Think You're Safe from DDos Attacks?
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationCDNetworks. Global CDN Service Leader. Rochelle Hugh
Global CDN Service Leader CDNetworks Rochelle Hugh (rhugh@cdnetworks.co.kr)) Handong Bldg 828-7, Yeoksam-Dong, Gangnam, Seoul 135-935 Tel: 82 2 3441-0400 / Fax: 82 2 565-8383 01 Company Overview Asia No1.
More informationWHITE PAPER. Manufacturers: Don t Let Internet Latency Destroy Your Global Strategy
WHITE PAPER Manufacturers: Don t Let Internet Latency Destroy Your Global Strategy TABLE OF CONTENTS Click to skip to each section TABLE OF CONTENTS 2 Executive Summary 3 Introduction: Speeding the internet
More informationThe Growing Problem of Mobile Adware
A MONTHLY MOBILE REVIEW The Growing Problem of Mobile Adware SEPTEMBER 2012 This monthly report reviews the mobile landscape including the findings of Trend Micro engineers and researchers. In this report
More informationSeven of top 10 smartphone markets declined in Q as Chinese vendors took over 50%
Seven of top 10 smartphone markets declined in Q3 2018 as Chinese vendors took over 50% Palo Alto, Shanghai, Singapore and Reading (UK) Wednesday, 7 November 2018 Worldwide smartphone shipments fell by
More informationContent Delivery Network (CDN) - Global Market Outlook ( )
Published on Market Research Reports Inc. (https://www.marketresearchreports.com) Home > Content Delivery Network (CDN) - Global Market Outlook (2015-2022) Content Delivery Network (CDN) - Global Market
More informationAnalisi degli attacchi DDOS e delle contromisure
Attacchi informatici: Strategie e tecniche per capire, prevenire e proteggersi dagli attacchi della rete Analisi degli attacchi DDOS e delle contromisure Alessandro Tagliarino 0 WHO IS ARBOR NETWORKS?
More informationIntroduction to DDoS Attacks
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter 2015 MCNC General Use v1.0 DDoS in the News July 2015 2015 MCNC General Use v1.0 DDoS
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationKaspersky Security Network
The Kaspersky Security Network (KSN) is a complex distributed infrastructure dedicated to intelligently processing cybersecurity-related data streams from millions of voluntary participants around the
More information2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015
2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING
More informationPhishing Activity Trends Report August, 2006
Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account
More informationIP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary
IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary Publication Date: September 9, 2002 Author Chee Eng To This document has been published to the following Cluster codes: TELC-WW-EX-0423
More informationDDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT
DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT SEPTEMBER 2014 COMMISSIONED BY: Contents Contents... 2 Introduction... 3 About the Survey and Respondents... 3 The Current State
More informationDistributed Denial of Service (DDoS)
Global Leader in DDoS Mitigation Threat Report Distributed Denial of Service (DDoS) Threat Report Q2 2017 456 Montgomery Street, Suite 800 San Francisco, CA 94104 USA +1 415 299 8550 Contents 1. Methodology...................
More informationCapability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One)
Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One) Presented by: Andrew Schmitt Theresa Chasar Mangaya Sivagnanam
More informationEconomic Outlook. William Strauss Senior Economist and Economic Advisor Federal Reserve Bank of Chicago
Economic Outlook Illinois Public Pension Fund Association Hoffman Estates, IL February 16, 217 William Strauss Senior Economist and Economic Advisor Federal Reserve Bank of Chicago GDP expanded by 1.9%
More informationThe Presence and Future of Web Attacks
Agenda The Presence and Future of Web Attacks Marco Fullin, CISSP Warning: This talk will be technical, chaotic and hurt Akamai Today Grow revenue opportunities with fast, personalized web experiences
More informationDoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action
DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action 1 Table of Content Preamble...3 About Radware s DefensePro... 3 About Radware s Emergency Response
More informationNigerian Telecommunications (Services) Sector Report Q2 2016
Nigerian Telecommunications (Services) Sector Report Q2 2016 01 SEPTEMBER 2016 Telecommunications Data The telecommunications data used in this report were obtained from the National Bureau of Statistics
More informationCompany Profile. Brazil 1 st Online Game Publisher. Company Name : Ongame Entretenimento S.A.
Brazil Company Profile Brazil 1 st Game Publisher Company Name : Ongame Entretenimento S.A. www.ongame.com.br Foundation : Aug. 2004 No. of Employees: 55 Main Contents : 7 games in service Dec. 2005 Open
More informationHerding Cats. Carl Brothers, F5 Field Systems Engineer
Herding Cats Carl Brothers, F5 Field Systems Engineer Agenda Introductions Security is easy, right Trivia Protecting your apps, one layer at a time How to survive an Attack Time permitting F5 Networks,
More informationSony Ericsson continues to invest for future growth
PRESS RELEASE April 23, 2008 Sony Ericsson continues to invest for future growth Q1 Highlights: Year-on-year volume growth of 2% Income before taxes at higher end of forecast R&D investment continues to
More informationThe Interactive Guide to Protecting Your Election Website
The Interactive Guide to Protecting Your Election Website 1 INTRODUCTION Cloudflare is on a mission to help build a better Internet. Cloudflare is one of the world s largest networks. Today, businesses,
More informationMBB Robot Crawler Data Report in 2014H1
MBB Robot Crawler Data Report in 2014H1 Contents Contents 1 Introduction... 1 2 Characteristics and Trends of Web Services... 3 2.1 Increasing Size of Web Pages... 3 2.2 Increasing Average Number of Access
More informationAnti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationImma Chargin Mah Lazer
Imma Chargin Mah Lazer How to protect against (D)DoS attacks Oliver Matula omatula@ernw.de #2 Denial of Service (DoS) Outline Why is (D)DoS protection important? Infamous attacks of the past What types
More informationHOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK
From the Security Experts at Corero Network Security HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK Be Proactive, Not Reactive STEP-BY-STEP GUIDE The Rise of Ransom-Driven DDoS Attacks Ransom-related Denial
More informationWhy Japan? Masashi Nakazono JETRO Genève. Prepared for Handelskammer beider Basel & JETRO seminar on 4 Nov 2016
Why Japan? Masashi Nakazono JETRO Genève Prepared for Handelskammer beider Basel & JETRO seminar on 4 Nov 2016 Copyright (C) 2016 JETRO. All rights reserved. Who are we? Japan External Trade Organization
More informationGMO Internet Group Profile. Internet for Everyone
GMO Internet Group Profile Internet for Everyone www.gmo.jp/en As of June 2018 Group Overview Company Name CEO & Founder Address GMO Internet, Inc. Masatoshi Kumagai Cerulean Tower, 26-1 Sakuragaokacho,
More informationNinthDecimal Mobile Audience Q Insights Report
Q1 2012 Insights Report Table of Contents Connected Device Trends 2-3 Mobile Shopping Behavior 4-5 Location Trends 6-7 Connected Device Adoption 8-9 On-the-go Consumers 37 % Worldwide Location Highlights
More informationPhishing Activity Trends
Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received rose to 24,853 in, an increase of over 1, from February but still more than
More informationBusiness Result for the Second Quarter ended September 30, 2017 Regional Market Environments and Projections
Business Result for the Second Quarter ended September 3, 217 Regional Market Environments and Projections October 2, 217 Hitachi Construction Machinery Co., Ltd. Executive Vice President and Executive
More informationTOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS
TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and
More informationDDOS RESILIENCY SCORE (DRS) "An open standard for quantifying an Organization's resiliency to withstand DDoS attacks" Version July
DDOS RESILIENCY SCORE (DRS) "An open standard for quantifying an Organization's resiliency to withstand DDoS attacks" Version 1.01.01 17 July 2017... Text is available under the GNU Free Documentation
More informationInternet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008
Internet Security Threat Report Volume XIII Patrick Martin Senior Product Manager Symantec Security Response October, 2008 Agenda 1 ISTR XIII Important Facts 2 ISTR XIII Key Messages 3 ISTR XIII Key Facts
More informationArbor WISR XII The Stakes Have Changed. Julio Arruda V1.0
Arbor WISR XII The Stakes Have Changed Julio Arruda V1.0 Overview This presentation provides a quick view of the ATLAS collected information for the year of 2016, then focus in Latin America targeted DDoS,
More informationDDoS MITIGATION BEST PRACTICES
DDoS MITIGATION BEST PRACTICES DDoS ATTACKS ARE INCREASING EXPONENTIALLY Organizations are becoming increasingly aware of the threat that Distributed Denial of Service (DDoS) attacks can pose. According
More informationDenial of Service Protection Standardize Defense or Loose the War
Denial of Service Protection Standardize Defense or Loose the War ETSI : the threats, risk and opportunities 16th and 17th - Sophia-Antipolis, France By: Emir@cw.net Arslanagic Head of Security Engineering
More informationACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018
ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials Supplementary material 2 KEY TAKEAWAYS FROM
More informationFMCG MONITOR JULY & Q2. An integrated view of Indonesia FMCG market. Kantar Worldpanel
FMCG MONITOR An integrated view of Indonesia FMCG market JULY & Q2 206 EXECUTIVE SUMMARY Q MARKET UPDATE Consumers slowly started to spend more FMCG products as value and volume sales increased in July
More informationDDOS-GUARD Q DDoS Attack Report
DDOS-GUARD Q4 2017 DDoS Attack Report 02 12,7% Number of attacks also dropped by 12,7% in comparison with same period in 2016 4613 Total number of DDoS attacks 36,8% Number of attacks dropped by 36.8%
More informationBASED ON INDICATOR OF COMPROMISE Hyeisun Cho, KISA; Seulgi Lee, KISA; Nakhyun Kim, KISA; Byung-ik Kim, KISA; Jun-hyung Park, KISA
CYBER THREAT ANALYSIS AND QUANTIFICATION Abstract BASED ON INDICATOR OF COMPROMISE Hyeisun Cho, KISA; Seulgi Lee, KISA; Nakhyun Kim, KISA; Byung-ik Kim, KISA; Jun-hyung Park, KISA As a large quantity of
More information