Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[February 14, 2024, 02:00:39 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno News
 Akamai PLXsert's Q4 2014 State of the Internet - Security Report Released
Pages: [1]   Go Down
  Print  
Author Topic: Akamai PLXsert's Q4 2014 State of the Internet - Security Report Released  (Read 896 times)
RealWire
TWI Hero
**********



Karma: 0
Offline Offline

Posts: 18530


View Profile Email


Number of DDoS attacks nearly doubled in a year
Expanded global DDoS traffic sources
Nearly half of all DDoS attacks used multiple attack vectors
AMSTERDAM. - January 29, 2015  - Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced the availability of the Q4 2014 State of the Internet - Security Report. The report is produced by Akamai's Prolexic Security Engineering and Research Team (PLXsert), leading professionals in distributed denial of service (DDoS) protection and cloud security services and strategies. This quarter's report, which provides analysis and insight into the global attack threat landscape including DDoS attacks observed across the PLXrouted network, can be downloaded at www.stateoftheinternet.com/security-report.

"An incredible number of DDoS attacks occurred in the fourth quarter, almost double what we observed in Q4 a year ago," said John Summers, vice president, Cloud Security Business Unit, Akamai. "Denial of service is a common and active threat to a wide range of enterprises. The DDoS attack traffic was not limited to a single industry, such as online entertainment that made headlines in December. Instead, attacks were spread among a wide variety of industries."

Akamai also observed a 52 percent increase in average peak bandwidth of DDoS attacks compared to Q4 a year ago. Large packets of unwanted network traffic can quickly sap an enterprise's ability to respond to legitimate customers, resulting in denial of service outages. Most unprotected sites cannot withstand a typical DDoS attack. As a result, DDoS attacks have become part of the common cybersecurity threatscape that all enterprises with an online presence must anticipate in a risk assessment.

DDoS-for-hire and the rise of reflection and multi-vector attacks Resourceful DDoS-for-hire booter suites took a low-investment approach by tapping into reflection-based DDoS attacks. Nearly 40 percent of all DDoS attacks used reflection techniques, which rely on Internet protocols that respond with more traffic than they receive and do not require an attacker to gain control over the server or device.

Widespread availability of for-hire DDoS services allowed low-level, non-technical attackers to purchase ready-to-use DDoS services. The expansion of the DDoS-for-hire market also promoted the use of multi-vector campaigns, as the competitive market drove attack innovation. Significantly more multi-vector attacks were observed - 88 percent more than in Q4 2013. More than 44 percent of all attacks used multiple attack vectors.

Changing global distribution of DDoS targets and sources
The timing of DDoS attacks was distributed more evenly in Q4, a DDoS trend that appears to be fueled by an increasing number of targets of greater value in previously underrepresented geographic locations. In addition, geographical sources of malicious traffic have shifted. The United States and China continued as the lead source countries for DDoS traffic, but instead of the Brazil, Russia, India and China (BRIC) block that dominated in Q3 2014, Q4 DDoS attack traffic came in large part from the United States, China and Western Europe.

Highlights from the Akamai PLXsert Q4 2014 State of the Internet - Security Report

Compared to Q4 2013

57 percent more DDoS attacks
52 percent increase in average peak bandwidth
77 percent decrease in average peak packets per second
51 percent more application layer attacks
58 percent more infrastructure layer attacks
28 percent increase in average attack duration
84 percent more multi-vector attacks
200 percent increase in 100+ Gbps attacks (9 vs. 3)

Compared to Q3 2014

90 percent more DDoS attacks
54 percent decrease in average peak attack bandwidth
83 percent decrease in average peak packets per second
16 percent more application layer attacks
121 percent more infrastructure layer attacks
31 percent increase in average attack duration
38 percent more multi-vector attacks
47 percent fewer 100+ Gbps attacks (9 vs. 17)

A look into botnets
Malware is often used for DDoS botnet expansion. Malware trends - multiplatform, operating system awareness, and destructive malware - are described in the Security Report. In addition, Akamai profiled multiple web application attack botnets using a new analysis technique that takes advantage of data gleaned from the Akamai Intelligent Platform™. The identified botnets were set up to automate the discovery of web application vulnerabilities for Remote File Inclusion (RFI) and Operating System (OS) Command Injection attacks. Akamai researchers profiled the botnets by identifying malicious code resource URLs and payloads that were identical among seemingly unrelated attacks. An attack payload was used to aggregate data and map botnet activity, actors and victim web applications. This profiling technique can help identify more attack sources.

Mitigation of bots, scrapers and spiders
While denial of service attacks impacts site performance significantly, web crawlers can also affect site performance to a lesser degree. The most poorly coded crawlers may even resemble DDoS traffic. Akamai classifies web crawlers based on desirability and impact on site performance. The Security Report provides advice on classifying and mitigating their effects.

Download the report
A complimentary copy of the Akamai PLXsert Q4 2014 State of the Internet - Security Report is available as a free PDF download at www.stateoftheinternet.com/security-report

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.102 seconds with 23 queries.