Jan 24, | CyberScoop
The size of distributed denial of service attacks continued to grow at a quicker rate than everzwijn last year, and the attacks also enlargened te frequency and complexity, according to Arbor Networks’ latest Worldwide Infrastructure Security Report.
The 12th annual report, published Tuesday, is based on a survey of 365 internet service providers, spil well spil other types of network operators from around the world, and on internet gegevens from Nov. through Oct. . Because Arbor provides services to so many large internet providers, it has visibility into about a third of all total internet traffic.
Distributed denial-of-service, or DDoS, attacks are at one level the most basic kleintje of cyberattack compromised devices, like individual computers infected by a virus, are marshaled into enormous androide networks or botnets, and flood the targeted webstek or other system with junk gegevens, slowing seguro traffic to a crawl or stopping it altogether.
The largest attack seen during the period covered ter the report aimed 800 gigabits vanaf 2nd, or GbPS, of gegevens at the target a 60 procent increase overheen the largest attack from the prior year. Since Arbor very very first began producing the report te 2005, maximum DDoS attack size has grown at a compound annual growth rate of 44 procent. But ter the past five years, since 2011, that rate has bot 68 procent, the company said te a release.
Maximum DDoS attack size ter gigabits vanaf 2nd, 2007-16 (Source: Arbor 12th Annual World Infrastructure Security Report, )
The report says the massive growth ter attack size has bot driven by two factors. Firstly, “the emergence and weaponization” of botnets based on compromised IoT devices or stulp routers, rather than computers, and secondly the enhanced use of “reflection amplification” by attackers. Reflection amplification leverages internet infrastructure like the domain name system or the network time protocol “to multiply attack traffic by hundreds of times, while hiding the vistoso source.”
Te a reflection attack, an attacker can “send 1GbPS of initial traffic, [and] 100 GbPS is delivered to the target.”
Spil the frequency of attacks rises, “the chances of being topper by a DDoS attack have never bot higher,” states the report.
Fifty-three procent of service providers said they are observing more than 21 attacks vanaf month up from 44 procent ter the prior year. Frequency grew much quicker for other sectors. Twenty-one procent of gegevens center respondents see more than 50 attacks vanaf month frente a only 8 procent last year, for example.
Also rising: complexity. While the basic DDoS attack is very straightforward, using internet traffic to overwhelm web-facing servers, there are other forms of DDoS that can be aimed at different aspects of victims’ infrastructures, like the application layer or the connection state tables ter firewalls, web application servers, and other infrastructure components. This last kleuter of attack is called a state-exhaustion or protocol attack.
A multi-vector attack is when several different attack modes are combined. Thesis attacks are popular with hackers “because they can be difficult to defend against and are often very effective,” states the report. The proportion of respondents watching multi-vector attacks on their networks enlargened significantly ter the period covered by the report, up to 67 procent from 56 procent the prior year and 42 procent the year before that.