VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Similar documents
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

DDOS-GUARD Q DDoS Attack Report

Global DDoS Threat Landscape

DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT

Distributed Denial of Service (DDoS)

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

DDoS attack patterns across the APJ cloud market. Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ

Introduction to DDoS Attacks

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

Domain Name Industry Drivers

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz

A10 DDOS PROTECTION CLOUD

Check Point DDoS Protector Introduction

DDoS Detection&Mitigation: Radware Solution

The Presence and Future of Web Attacks

DDoS Mitigation & Case Study Ministry of Finance

Prolexic Attack Report Q4 2011

Arbor WISR XII The Stakes Have Changed. Julio Arruda V1.0

akamai s [state of the internet] / security

Distributed Denial of Service (DDoS)

SmartWall Threat Defense System - NTD1100

DNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER

2016 Calendar of System Events and Moratoriums

F5 Warsaw SOC. Kamil Woniak. Security Operations Manager, F5 Networks

Analisi degli attacchi DDOS e delle contromisure

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Large FSI DDoS Protection Reference Architecture

War Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC

Defending against increasingly sophisticated DDoS attacks

( ) 2016 NSFOCUS

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Radware DefensePro DDoS Mitigation Release Notes Software Version Last Updated: December, 2017

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Opportunities for Exploiting Social Awareness in Overlay Networks. Bruce Maggs Duke University Akamai Technologies

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

A Survey of Defense Mechanisms Against DDoS Flooding A

Root KSK Roll Update Webinar

Mitigating DDoS Attacks in Zero Seconds with Proactive Mitigation Controls

DDoS Protection in Backbone Networks

A Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover

DDOS RESILIENCY SCORE (DRS) "An open standard for quantifying an Organization's resiliency to withstand DDoS attacks" Version July

Hongbo Yang, Xiaobing Sun, Richard Zhao

CCNA Security Official Cert Guide First Edition. Copyright 2015 Cisco Systems, Inc. ISBN-10: ISBN-13:

SOTI SUMMER [state of the internet] / security ATTACK SPOTLIGHT

Check Point DDoS Protector Simple and Easy Mitigation

Improving PF's performance and reliability Lessons learned from bashing pf with DDoS attacks and other malicious traffic. By Kajetan Staszkiewicz,

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

TESTING DDOS DEFENSE EFFECTIVENESS AT 300 GBPS SCALE AND BEYOND

Global DDoS Threat Landscape

MULTIPLAYER GAMING SOLUTION BRIEF

The Interactive Guide to Protecting Your Election Website

DocAve Backup for Salesforce. Release Notes

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

Enterprise D/DoS Mitigation Solution offering

EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE

DOMAIN NAME SECURITY EXTENSIONS

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

What s in a Name (collision)? Modeling and Quantifying Collision Potential

Cyber War Chronicles Stories from the Virtual Trenches

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

2015 DDoS Attack Trends and 2016 Outlook

AvePoint Cloud Backup for Salesforce. Release Notes

Innovation in the Cloud: How to Grow Markets, Reduce Risks, and Improve the Customer Experience

DENIAL OF SERVICE ATTACKS

IP Addressing: Fragmentation and Reassembly Configuration Guide

Secure your Web Applications with AWS WAF & AWS Shield. James Chiang ( 蔣宗恩 ) AWS Solution Architect

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER

IBM Cloud Internet Services: Optimizing security to protect your web applications

Arbor White Paper Keeping the Lights On

Comprehensive datacenter protection

Corero & GTT DDoS Trends Report Q2 Q3 2017

Dell EMC Ready Solution for VMware vcloud NFV 3.0 OpenStack Edition Platform

network security s642 computer security adam everspaugh

Advanced Attack Response and Mitigation

DefensePro. Release Notes

Physical Security Reliability Standard Implementation

Cloudflare Advanced DDoS Protection

How Microsoft IT Reduced Operating Expenses Using Virtualization

AKAMAI THREAT ADVISORY. Satori Mirai Variant Alert

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

Dell EMC. Converged Technology Extension for Isilon Storage Product Guide

IxLoad-Attack TM : Network Security Testing

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER

Wired Network Summary Data Overview

Security and Stability Advisory Committee!! Activities Update! ICANN Los Angeles Meeting! October 2014! #ICANN51

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

Transcription:

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 5, ISSUE 2 2ND QUARTER 2018 Complimentary report supplied by

CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q2 2018 4 DDoS Attacks Increase in Size and Number 4 Multi-Vector DDoS Attacks Remain Constant 6 Types of DDoS Attacks 7 Largest Volumetric Attack and Highest Intensity Flood Attack 8 Mitigations on Behalf of Verisign Customers by Industry for Q2 2018 8 VERISIGN DDoS TRENDS REPORT Q2 2018 2

EXECUTIVE SUMMARY This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services during Q2 2018. This report offers a unique view into the attack trends unfolding online, including attack statistics and behavioral trends for Q2 2018.* 52% of attacks employed multiple attack types Verisign observed the following key trends in Q2 2018: Number of Attacks Largest Attack Peak Size Average of Attack Peak Sizes Most Common Attack Type Mitigated in Q2 2018 35% increase compared to Q1 2018 Volume 42 Gbps Speed 4.7 Mpps 5.7Gbps 111% increase compared to Q2 2017 26% of attacks over 5 Gbps 56% of attacks were User Datagram Protocol (UDP) floods 20% of attacks employed three or more attack types VERISIGN DDoS TRENDS REPORT Q2 2018 3

VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q2 2018 DDoS Attacks Increase in Size and Number Verisign observed that 58 percent of DDoS attacks were over 1 Gbps (Figure 1). When comparing Q2 2018 to Q1 2018, Verisign saw a 35 percent increase in the number of attacks, and a 49 percent decrease in the average of attack peak sizes (Figure 2). Year-over-year the average of attack peak sizes increased 111 percent. Verisign additionally observed that 62 percent of its customers who experienced DDoS attacks in Q2 2018 were targeted multiple times during the quarter. Overall, DDoS attacks remain unpredictable and vary widely in terms of speed and complexity. Attack Size 58% peaked over 1 Gbps >10 Gbps >5<10 Gbps >1<5 Gbps <1 Gbps Q3 2016 Q4 2016 Q1 2017 Q2 2017 Q3 2017 Q4 2017 Q1 2018 Q2 2018 100 80 60 40 20 0 Percent of Attacks Figure 1: Mitigation Peaks by Quarter from Q3 2016 to Q2 2018 VERISIGN DDoS TRENDS REPORT Q2 2018 4

Average of Attack Peak Size 5.7 Gbps 111% increase in average of attack peak size compared to Q2 2017 20 18 16 12.8 11.2 14.1 11.2 14 12 10 Gbps 7.6 5.7 8 6 4 Q3 2016 Q4 2016 Q1 2017 2.7 Q2 2017 0.8 Q3 2017 Q4 2017 Q1 2018 Q2 2018 2 0 Figure 2: Average of Attack Peak Size by Quarter from Q3 2016 to Q2 2018 VERISIGN DDoS TRENDS REPORT Q2 2018 5

Multi-Vector DDoS Attacks Remain Constant Fifty-two percent of DDoS attacks mitigated by Verisign in Q2 2018 employed multiple attack types (Figure 3). Verisign observed attacks targeting networks at multiple layers and attack types that changed over the course of a DDoS event. Verisign continues to observe attacks utilizing a diverse and evolving arsenal of attack vectors across diverse ports and protocols. In Q2 2018, Verisign observed attackers targeting corporate network services including email and IPSec leveraging SNMP and GRE attack vectors. Today s DDoS attacks require continuous monitoring to optimize mitigation strategies. 52% of DDoS attacks in Q2 2018 utilized at least two different attack types 10% 32% 10% 48% 1 Attack Type 2 Attack Types 3 Attack Types >4 Attack Types Figure 3: Number of Attack Types per DDoS Event in Q2 2018 VERISIGN DDoS TRENDS REPORT Q2 2018 6

Types of DDoS Attacks UDP flood attacks were the most common attack vector in Q2 2018, accounting for 56 percent of total attacks in the quarter (Figure 4). The most common UDP floods included Domain Name System (DNS), Lightweight Directory Access Protocol (LDAP), Network Time Protocol (NTP) and Simple Network Management Protocol (SNMP) amplification attacks. 56% of DDoS attacks were 5% 3% 10% UDP FLOODS 56% 26% IP Fragment Attacks TCP Based UDP Based Layer 7 Other Figure 4: Types of DDoS Attacks in Q2 2018 VERISIGN DDoS TRENDS REPORT Q2 2018 7

Largest Volumetric Attack and Highest Intensity Flood Attack The largest volumetric DDoS attack observed by Verisign in Q2 2018 was a UDP fragment flood that peaked at approximately 42 Gbps and 3.5 Mpps and lasted approximately 3 hours. The highest intensity DDoS attack observed by Verisign in Q2 2018 was a multi-vector attack that peaked at approximately 38 Gbps and 4.7 Mpps and lasted for approximately 2 hours. The attack consisted of a wide range of attack vectors including DNS, NTP and SNMP Amplification attacks and TCP SYN and TCP RST floods. Mitigations on Behalf of Verisign Customers by Industry for Q2 2018 1 Financial 43% of mitigations Average attack size: 5 Gbps IT Services/ Cloud/SaaS 37% of mitigations Average attack size: 5.7 Gbps Media and Entertainment 20% of mitigations Average attack size: 7.5 Gbps 1 The attacks reported by industry in this report are solely a reflection of the Verisign DDoS Protection Service customer base. VERISIGN DDoS TRENDS REPORT Q2 2018 8

To learn more about different mitigation options, download our e-book: A Guide to Selecting the Best Mitigation Option for Your Organization. TO LEARN MORE ABOUT VERISIGN DDoS PROTECTION SERVICES, VISIT Verisign.com/DDoS. About Verisign Verisign, a global leader in domain names and internet security, enables internet navigation for many of the world s most recognized domain names and provides protection for websites and enterprises around the world. Verisign ensures the security, stability and resiliency of key internet infrastructure and services, including the.com and.net top-level domains and two of the internet s root servers, as well as performs the root zone maintainer function for the core of the internet s Domain Name System (DNS). Verisign s Security Services include Distributed Denial of Service Protection and Managed DNS. Definitions Q1 First quarter of the year - January 1 to March 31 Q2 Second quarter of the year - April 1 to June 30 Q3 Third quarter of the year - July 1 to September 30 Q4 Fourth quarter of the year - October 1 to December 31 Q2 2017 Second quarter of 2017 from April 1, 2017 to June 30, 2017 Q1 2018 First quarter of 2018 from January 1, 2018 to March 31, 2018 Q2 2018 Second quarter of 2018 from April 1, 2018 to June 30, 2018 Gbps Gigabits per second Mpps Million packets per second *The information in this Verisign Distributed Denial of Service Trends Report (this Report ) is believed by Verisign to be accurate at the time of publishing based on currently available information. All information in this Report is solely a reflection of the observations and insights derived from the DDoS attack mitigations enacted on behalf of, and in cooperation with, the customers of Verisign DDoS Protection Services. Verisign provides this Report for your use in AS IS condition and at your own risk. Verisign does not make any and disclaims all representations and warranties of any kind with regard to this Report, including, but not limited to, any warranties of merchantability or fitness for a particular purpose. VERISIGN DDoS TRENDS REPORT Q2 2018 9

Verisign.com 2018 VeriSign, Inc. All rights reserved. VERISIGN and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners. Verisign Public VRSN_DDoS_TR_Q2-18_A10-Networks_201809