Global DDoS Attack Report
Q4 2013 Trends and Statistics
www.prolexic.com
Highlights: Q4 2013 Global DDoS Attack Report
• Mobile devices and apps used in attack campaigns
against enterprises
• Rec...
DDoS attack vectors used in Q4 2013

3
Attack vector analysis
• Use of the CHARGEN protocol increased 92.31
compared to Q3
• UDP and SYN floods were the most pop...
DDoS attack frequency in Q4 2013
• More attacks mitigated than any other quarter
• November 5-11 was the most active week ...
Top 10 DDoS source countries for Q4 2013

6
Attack spotlight: Multi-vector attack campaign
•
•
•
•

Campaign targeted a global financial services firm
12 unique attac...
Attack spotlight: Multi-vector DDoS xampaign,
continued

• Botnets included willing and unwilling participants
• Some part...
Prolexic Q4 2013 Global DDoS Attack Report
• Download the Q4 2013 Global Attack Report for:
– Average and trends in attack...
About Prolexic
• Prolexic Technologies is the world’s largest and
most trusted provider of DDoS protection and
mitigation ...
Upcoming SlideShare
Loading in...5
×

Overview of Global DDoS Attack Report: Q4 2013

2,823
-1

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,823
On Slideshare
0
From Embeds
0
Number of Embeds
12
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Overview of Global DDoS Attack Report: Q4 2013

  1. 1. Global DDoS Attack Report Q4 2013 Trends and Statistics www.prolexic.com
  2. 2. Highlights: Q4 2013 Global DDoS Attack Report • Mobile devices and apps used in attack campaigns against enterprises • Record volume of attacks for one quarter • Mitigated largest attack to date: 179 Gbps • Average attack duration: 22.88 hours • Peak average bandwidth: 4.53 Gbps • Peak packets per second: 10.60 Mpps Download the Q4 2013 Global DDoS Attack Report for supporting data and analysis 2
  3. 3. DDoS attack vectors used in Q4 2013 3
  4. 4. Attack vector analysis • Use of the CHARGEN protocol increased 92.31 compared to Q3 • UDP and SYN floods were the most popular infrastructure-layer attack vectors • HTTP GET floods were the most popular application layer attack vectors • Misuse of the Network Time Protocol (NTP) is an emerging trend that should be monitored Download the Q4 2013 Global DDoS Attack Report for attack vector data 4
  5. 5. DDoS attack frequency in Q4 2013 • More attacks mitigated than any other quarter • November 5-11 was the most active week in Q4 5
  6. 6. Top 10 DDoS source countries for Q4 2013 6
  7. 7. Attack spotlight: Multi-vector attack campaign • • • • Campaign targeted a global financial services firm 12 unique attacks 4 days and nights Campaign could not be stopped by automated DDoS mitigation devices • Mitigating this DDoS attack required the skill and creativity of expert DDoS mitigation engineers 7
  8. 8. Attack spotlight: Multi-vector DDoS xampaign, continued • Botnets included willing and unwilling participants • Some participants opted into the botnet with Low Orbit Ion Cannon (LOIC) • Mobile DDoS apps detected – AnDOSid, an Android app that launches an HTTP POST flood – Mobile LOIC, an Android app that allows users to opt-in • Large portion of the attack originated from Asia 8 CONFIDENTIAL
  9. 9. Prolexic Q4 2013 Global DDoS Attack Report • Download the Q4 2013 Global Attack Report for: – Average and trends in attack duration and bandwidth – Total number and trends of attacks by type – Year-over-year and quarter-over-quarter comparisons – Analysis of the attack against the financial services firm – Details about the DDoS trend of attacks from Asia 9
  10. 10. About Prolexic • Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services • Prolexic has successfully stopped DDoS attacks for more than a decade • Our global DDoS mitigation network and 24/7 security operations center (SOC) can stop even the largest attacks that exceed the capabilities of other DDoS mitigation service providers 10
  1. Gostou de algum slide específico?

    Recortar slides é uma maneira fácil de colecionar informações para acessar mais tarde.

×