Cloud NewsNews

IT, Cloud, SaaS industry most vulnerable to DDoS attacks: Verisign Report 

1 Mins read

As per the recently released “Q3 2017 DDoS Trends Report by Verisign, 29% of online attacks during third quarter of 2017 involved five or more types of attacks.

88% of attacks involved multiple attack types that were targeting multiple layers and varied according to distributed denial of service (DDoS) event.

Verisign reported that 56% of the total attacks in Q3 2017 involved User Datagram Protocol (UDP) flood attacks like Domain Name System (DNS), Network Time Protocol (NTP), Simple Service Discovery Protocol (SSDP), Character Generator Protocol (CHARGEN) and Simple Network Management Protocol (SNMP) reflective amplification attacks.

Image source: VERISIGN DDoS TRENDS REPORT

The IT, Cloud, and SaaS industry accounted for 45% of the total mitigation activities, and became the most targeted industry for 12th consecutive quarter.

20% of total mitigations comprised the financial space, while the media and entertainment/content industry represented 15% of mitigations.

E-commerce and online advertising industry was the least affected, accounting for only 5% of the mitigation activity.

According to the report, the largest volumetric DDoS attack during the quarter was a multi-vector attack, which peaked at around 2.5 Gigabits per second (Gbps) and around 1 Million packets per second (Mbps), for one hour.

The highest intensity packet flood peaked at around 2.3 Mbps and around 1 Gbps, for two and half hours.

On comparing the results of Q3 2017 to Q2 2017, it was found that the number of attacks have reduced by 17%, while the peak size of average attacks has reduced by 70%. Although the number of DDoS attacks have reduced, the attacks still remain unpredictable.

Also read: Many organizations unprepared for DNS attacks, reveals new global survey

The report suggests that now is the right time for every organization to review their network and application security solutions, and protect themselves against DDoS attacks and security threats in future.

Leave a Reply

Your email address will not be published. Required fields are marked *

forty eight ÷ six =