Analysis of 244,703 DDoS incidents
Posted on 27 March 2014.
NSFOCUS released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year. The report includes statistical analysis and key observations based on 244,703 DDoS incidents.


Observations indicate that DDoS attacks are maturing in the era of APT. DDoS attacks have been used as smokescreens to carry out APT attacks or for other malicious purposes. The report also notes the availability of DDoS-as-a-service, which affords anyone with a computer and a credit card the ability to carry out an attack.

DDoS amplification attacks will continue to present a challenge, as the March 2013 attack on anti-spam organization Spamhaus proved, in which traffic reached 300 Gbps. However, the potential for more severe DDoS amplification attacks, such as ones leveraging the NTP, can far exceed the bandwidth levels seen to date.

"DDoS is quickly becoming a common pain point, and businesses need to take this threat seriously if they expect to provide uninterrupted service to their customers," said Frank Ip, vice president of U.S. operations for NSFOCUS.

In 2013, cyberattackers gave the market a lesson in hackernomics and showcased the myriad ways in which they have evolved their attack strategies to deploy sophisticated techniques that will inflict the maximum amount of damage using the fewest resources. The more we learn about attack mentality, the stronger our defenses become," Ip added.

Findings reveal that hackernomics is driving an overarching DDoS trend of smaller, shorter and repeated attacks. The purpose of most attacks is to disrupt, not to destroy. As such, small application-layer or hybrid attacks, which are cheaper to launch, can cause substantial damage to network resources.

DNS attacks increased as a result of advancements in anti-DDoS technologies that can better counter other attack vectors, and DNS infrastructure continues to remain one of the weakest links.





Spotlight

Most popular Android apps open users to MITM attacks

Posted on 21 August 2014.  |  An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused for executing MITM attacks, and occasionally additional ones, as well.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Aug 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //