SlideShare a Scribd company logo
1 of 10
stateoftheinternet.com
[Q3 2014]
Spotlight on a 321 Gbps Attack
= high-bandwidth attack on entertainment firm
• 10 distinct attacks over a one-week period
• 8 of 10 attack campaigns were high-bandwidth (100+
Gbps)
• Peak bandwidth of the largest attack: 321 Gbps (a record)
• This multi-vector attack hit:
⁄ Layer 7 (application layer)
⁄ Layer 3 (infrastructure layer)
• All attacks were successfully mitigated by Akamai
• Source IP addresses remain under watch
2 / [state of the internet] / security (Q3 2014)
= timeline of attacks
• Attackers targeted an Akamai customer and Akamai’s DDoS
mitigation infrastructure
• First attacks hit a customer’s web server
⁄ First and third attacks exceeded 100 Gbps
• Next attack targeted an Akamai-owned network block protecting
the target
⁄ Peak 321-Gbps attack aimed at bypassing DDoS mitigation technology or
causing it to fail
• After failing to bypass DDoS protections, attacks resumed on
the customer’s website
• Attacks persisted from July 12 to July 20, averaging 90 hours
3 / [state of the internet] / security (Q3 2014)
= botnet topology
• The attacks were launched by a collection of bots
reporting to a command-and-control (C2) host
• The source IP sending commands was located in Asia
• Bots were worldwide
⁄ Most traffic originated in U.S., Germany and China
⁄ Another botnet sending attack payloads was located in Korea
• Botnets were built by targeting:
⁄ Linux-based servers
⁄ Customer-premises equipment
4 / [state of the internet] / security (Q3 2014)
= attack vectors
Multi-vector attacks used multiple types of flood:
• SYN flood
• UDP flood
• ICMP flood
• RESET flood
• GET flood
⁄ Note: GET flood attacks usually reveal the actual source IP addresses
• Attackers used mostly SYN flood and UDP flood traffic,
often together
5 / [state of the internet] / security (Q3 2014)
= about SYN floods
• Subvert the normal Transmission Control Protocol (TCP)
used to establish a valid connection
• Send multiple requests at a rapid rate or send extra large
packets
• Can render an unprotected server unable to respond to
legitimate requests
6 / [state of the internet] / security (Q3 2014)
= about UDP floods
• Exploit the User Datagram Protocol (UDP)
• Are a common protocol in voice-over-IP (VoIP) and online
games
• Do not require establishing a verified connection to initiate
communication
• Make spoofing a source IP easy
• Subvert mitigation efforts with spoofed addresses
7 / [state of the internet] / security (Q3 2014)
= attack statistics
• Attack averages
⁄ 154 Gbps
⁄ 54 Mpps
⁄ 90 hours
• Peak attack stats:
⁄ 321 Gbps
⁄ 169 Mpps
• Top three non-spoofed source IP origins
⁄ U.S.: 49%
⁄ Germany: 21%
⁄ China: 19%
8 / [state of the internet] / security (Q3 2014)
= Q3 2014 state of the internet – security report
Download the Q3 2014 State of the Internet – Security Report,
which includes:
• Analysis of DDoS attack trends
• Bandwidth (Gbps) and volume (Mpps) statistics
• Year-over-year and quarter-by-quarter analysis
• Application layer attacks and infrastructure attacks
• Attack frequency, size and sources
• Where and when DDoSers strike
• How and why attackers are building DDoS botnets from devices other than PCs
and servers
• Details of a record-breaking 321 Gbps DDoS attack
• Syrian Electronic Army (SEA) phishing attacks
• More at www.stateoftheinternet.com/security-reports
9 / [state of the internet] / security (Q3 2014)
= about stateoftheinternet.com
• StateoftheInternet.com, brought to you by Akamai, serves as the home
for content and information intended to provide an informed view into
online connectivity and cybersecurity trends as well as related metrics,
including Internet connection speeds, broadband adoption, mobile
usage, outages, and cyber-attacks and threats.
• Visitors to www.stateoftheinternet.com can find current and archived
versions of Akamai’s State of the Internet (Connectivity and Security)
reports, the company’s data visualizations, and other resources
designed to put context around the ever-changing Internet landscape.
10 / [state of the internet] / security (Q3 2014)

More Related Content

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Q3 2014 State of the Internet - Security Report -- Attack Spotlight

  • 2. = high-bandwidth attack on entertainment firm • 10 distinct attacks over a one-week period • 8 of 10 attack campaigns were high-bandwidth (100+ Gbps) • Peak bandwidth of the largest attack: 321 Gbps (a record) • This multi-vector attack hit: ⁄ Layer 7 (application layer) ⁄ Layer 3 (infrastructure layer) • All attacks were successfully mitigated by Akamai • Source IP addresses remain under watch 2 / [state of the internet] / security (Q3 2014)
  • 3. = timeline of attacks • Attackers targeted an Akamai customer and Akamai’s DDoS mitigation infrastructure • First attacks hit a customer’s web server ⁄ First and third attacks exceeded 100 Gbps • Next attack targeted an Akamai-owned network block protecting the target ⁄ Peak 321-Gbps attack aimed at bypassing DDoS mitigation technology or causing it to fail • After failing to bypass DDoS protections, attacks resumed on the customer’s website • Attacks persisted from July 12 to July 20, averaging 90 hours 3 / [state of the internet] / security (Q3 2014)
  • 4. = botnet topology • The attacks were launched by a collection of bots reporting to a command-and-control (C2) host • The source IP sending commands was located in Asia • Bots were worldwide ⁄ Most traffic originated in U.S., Germany and China ⁄ Another botnet sending attack payloads was located in Korea • Botnets were built by targeting: ⁄ Linux-based servers ⁄ Customer-premises equipment 4 / [state of the internet] / security (Q3 2014)
  • 5. = attack vectors Multi-vector attacks used multiple types of flood: • SYN flood • UDP flood • ICMP flood • RESET flood • GET flood ⁄ Note: GET flood attacks usually reveal the actual source IP addresses • Attackers used mostly SYN flood and UDP flood traffic, often together 5 / [state of the internet] / security (Q3 2014)
  • 6. = about SYN floods • Subvert the normal Transmission Control Protocol (TCP) used to establish a valid connection • Send multiple requests at a rapid rate or send extra large packets • Can render an unprotected server unable to respond to legitimate requests 6 / [state of the internet] / security (Q3 2014)
  • 7. = about UDP floods • Exploit the User Datagram Protocol (UDP) • Are a common protocol in voice-over-IP (VoIP) and online games • Do not require establishing a verified connection to initiate communication • Make spoofing a source IP easy • Subvert mitigation efforts with spoofed addresses 7 / [state of the internet] / security (Q3 2014)
  • 8. = attack statistics • Attack averages ⁄ 154 Gbps ⁄ 54 Mpps ⁄ 90 hours • Peak attack stats: ⁄ 321 Gbps ⁄ 169 Mpps • Top three non-spoofed source IP origins ⁄ U.S.: 49% ⁄ Germany: 21% ⁄ China: 19% 8 / [state of the internet] / security (Q3 2014)
  • 9. = Q3 2014 state of the internet – security report Download the Q3 2014 State of the Internet – Security Report, which includes: • Analysis of DDoS attack trends • Bandwidth (Gbps) and volume (Mpps) statistics • Year-over-year and quarter-by-quarter analysis • Application layer attacks and infrastructure attacks • Attack frequency, size and sources • Where and when DDoSers strike • How and why attackers are building DDoS botnets from devices other than PCs and servers • Details of a record-breaking 321 Gbps DDoS attack • Syrian Electronic Army (SEA) phishing attacks • More at www.stateoftheinternet.com/security-reports 9 / [state of the internet] / security (Q3 2014)
  • 10. = about stateoftheinternet.com • StateoftheInternet.com, brought to you by Akamai, serves as the home for content and information intended to provide an informed view into online connectivity and cybersecurity trends as well as related metrics, including Internet connection speeds, broadband adoption, mobile usage, outages, and cyber-attacks and threats. • Visitors to www.stateoftheinternet.com can find current and archived versions of Akamai’s State of the Internet (Connectivity and Security) reports, the company’s data visualizations, and other resources designed to put context around the ever-changing Internet landscape. 10 / [state of the internet] / security (Q3 2014)