SlideShare a Scribd company logo
1 of 23
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 1
DDoS Attacks in 2020 &
Best Practices in Defense
Tom Bienkowski
Director Product Marketing
Richard Hummel
Manager, Threat Response
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 2
DDoS Attacks – 1st Half 2020
Number
Size
Types
Targets
Protection
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 3
NETSCOUT Cyber Threat Horizon
https://www.netscout.com/horizon
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 4
DDoS Attacks – 1st Half 2020
Number
Size
Types
Targets
Protection
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 5
Number of DDoS Attacks
Worldwide, Six-Month Review 2020 vs. 2019
▪ Number of attacks 4.83M, 15% from 2019
Number of DDoS Attacks (Millions)
2019 2020
Q1 2.04 2.21
Q2 2.17 2.62
Total 4.21 4.83
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 6
DDoS Attacks Increased During COVID-19
Lockdown
Note: July
was 828k…Is
this a new
normal?
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 7
DDoS Attacks – 1st Half 2020
Number
Size
Types
Targets
Protection
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 8
Size of DDoS Attacks
Worldwide Six-Month Review 2020 vs. 2019
▪ Largest attack
1.12Tbps,
77% bigger than
largest in 2019
Peak Volume DDoS Attacks (Gbps)
2019 2020
Q1 510 488
Q2 634 1120
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 9
Size of DDoS Attacks
Worldwide Six-Month Review 2020 vs. 2019
▪ Largest attack
1.12Tbps,
77% bigger than
largest in 2019
Peak Volume DDoS Attacks (Gbps)
2019 2020
Q1 510 488
Q2 634 1120
Peak Speed DDoS Attacks (Mpps)
2019 2020
Q1 358 392
Q2 364 407
▪ Largest attack
407 Mpps,
12% bigger than
largest in 2019
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 10
Size of DDoS Attacks
Worldwide Six-Month Review 2020 vs. 2019
Vast majority of DDoS attacks are small-sized & short-lived.
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 11
DDoS Attacks – 1st Half 2020
Number
Size
Types
Targets
Protection
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 12
Types of DDoS Attacks
The Internet
BotNet
Your ISP
Firewall/VPN
Your Data Center
Legitimate Traffic
State-Exhaustion Attacks
◦ Designed to target stateful devices (Load
balancer, firewall, VPN, IPS)
Volumetric Attacks
◦ Large (up to 1.2 Tbps)
◦ Designed to saturate links
Application Layer Attacks
◦ Low and slow, stealth attacks
◦ Crashes application servers
The modern-day DDoS attack is complex as it can
dynamically uses 15+ vectors
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 13
Different DDoS Attack Vectors
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 14
Real World Examples of Multi-Vector DDoS Attacks
StartDate StopDate
Volume
(Gbps)
Speed
(Mpps) Region Vectors
Small-sized + short-lived + multi vector = Increase in Complexity
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 15
DDoS Attacks – 1st Half 2020
Number
Size
Types
Targets
Protection
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 16
Notable DDoS Attacks Per Industry Sector
Worldwide, Six-Month Review 2020 vs. 2019
Industry #Attacks Max
Volume
Max
Speed
Avg
Duration
Telecommunications -18% -23% +13% -48%
Data Processing ,
Hosting and Related
+21% -20% -57% -15%
Nonstore Retailers +43% -44% +48% +8%
Hospitals +25% +255% +15% -3%
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 17
Notable DDoS Attacks Per Country
Worldwide, Six-Month Review 2020 vs. 2019
Country #Attacks Max
Volume/
Max
Speed
Avg
Duration
United States +13% +8% +23% -21%
United Kingdom +62% +39% -60% -56%
Germany +233% +266% -36% -47%
Canada -25% -42% -51% +31%
▪ The average volume and speed of attack traffic on a per second basis flowing in/out of these
countries:
➢ US: 278.02 Gbps, 59.98 Mpps
➢ UK: 32.50 Gbps, 5.56 Mpps
➢ Germany: 136.67 Gbps, 22.89 Mpps
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 18
Worldwide DDoS Attacks
Worldwide, Six-Month Review 2020 vs. 2019
DDoS Attack Frequency:
➢ Number of attacks 4.83M, 15% from 2019
➢ 25% during COVID-19 Pandemic lockdown
DDoS Attack Size:
➢ Largest attack 1.12Tbps, 77% bigger than largest in 2019
➢ However, vast majority of attacks are small, 74% attacks <1Gbps
DDoS Attack Duration:
➢ Longest duration attack was 7 days
➢ However vast majority of attacks, 92% attacks last <1Hour
Summary: DDoS Attacks Increase 25% in Frequency and
Complexity During COVID-19 Pandemic
DDoS Attack Vectors:
➢ 15+ vector attacks becoming more common.
1H 2020
Looks for more information
when we release the next
report at end of September!
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 19
DDoS Attacks – 1st Half 2020
Number
Size
Types
Targets
Protection
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 20
The modern-day DDoS attack is complex as it can
dynamically uses 15+ vectors
Types of DDoS Attacks
The Internet
BotNet
Your ISP
Firewall/VPN
Your Data Center
Legitimate Traffic
State-Exhaustion Attacks
◦ Designed to target stateful devices (Load
balancer, firewall, VPN, IPS)
Volumetric Attacks
◦ Large (up to 1.2 Tbps)
◦ Designed to saturate links
Application Layer Attacks
◦ Low and slow, stealth attacks
◦ Crashes application servers
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 21
Stopping The Modern Day DDoS Attack Requires
Intelligently Automated, Hybrid Protection
4 Backed by continuous
threat intelligence.
Your Data Centers/
Internal Networks
The Internet
ISP Network
Scrubbing Center
Volumetric Attack
Automatically stop
large attacks In-Cloud.
3
Automatic, intelligent communication
between on-prem and cloud-based
protection to address dynamic, multi-vector
attacks.
2
State Exhaustion & Application Attack
Automatically stop state exhaustion and application
layer DDoS attacks on premises, in front of stateful
devices (e.g. firewall/VPN concentrator) and
application servers.
1
DDoS
Protection
The Internet
Firewall/VPN Application Servers
A Recommended Industry Best Practice:
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 22
NETSCOUT Arbor Smart DDoS Protection Solution
Your Data Centers/
Internal Networks
The Internet
ISP Network
State Exhaustion & Application Attack
AED is an on-premise, stateless, product that can
stop all types of inbound DDoS attacks and outbound
communication from compromised internal devices -
providing a First and Last Line of Defense
1
AED’s Cloud Signaling can intelligently communicate
with a cloud-based mitigation service (e.g. your ISP
or Arbor Cloud) to stop the large attacks.
2
The Internet
Firewall/VPN Application Servers
Arbor Edge
Defense
(AED)
Volumetric Attack
Mitigate large attacks with
ISP or Arbor Cloud which
has 11 worldwide scrubbing
centers with over 14 Tbps of
mitigation capacity.
3
Arbor Cloud
4
Backed by continuous Threat
Intelligence for ASERT/ATLAS and can
be a fully managed services.
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 23
THREAT INTELLIGENCE REPORT
VISIT LINK FOR LATEST REPORT
https://www.netscout.com/threatreport

More Related Content

What's hot

Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksCloudflare
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 
9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time 9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time Haltdos
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantHaltdos
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformationCloudflare
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101Cloudflare
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber WarRadware
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeNeustar, Inc.
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksForcepoint LLC
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSLarry Austin
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...Internetwork Engineering (IE)
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security ServicesRadware
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial TsunamiForcepoint LLC
 
Authentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsAuthentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsCloudflare
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]Radware
 
NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeawaysNDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeawaysBryson Bort
 

What's hot (20)

Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time 9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial Tsunami
 
2019 State of Cyber Security Report
2019 State of Cyber Security Report2019 State of Cyber Security Report
2019 State of Cyber Security Report
 
Authentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsAuthentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of Things
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
ISTR 23: Internet Security Threat Report
ISTR 23: Internet Security Threat Report ISTR 23: Internet Security Threat Report
ISTR 23: Internet Security Threat Report
 
NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeawaysNDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeaways
 

Similar to DDoS Attacks Increased 25% During COVID-19 Pandemic

Worldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsWorldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsAPNIC
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / securityThe Internet of Things
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016Qrator Labs
 
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Wallarm
 
2015-cloud-security-report-q2
2015-cloud-security-report-q22015-cloud-security-report-q2
2015-cloud-security-report-q2Gaurav Ahluwalia
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 
MNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat LandscapeMNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat LandscapeMNCERT
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz Asia Pte Ltd
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
comparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-papercomparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-paperRenny Shen
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationCorero Network Security
 
Radware Solutions for MSSPs
Radware Solutions for MSSPsRadware Solutions for MSSPs
Radware Solutions for MSSPsRadware
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfTuPhan66
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesCristian Garcia G.
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS ProvidersNeil Hinton
 

Similar to DDoS Attacks Increased 25% During COVID-19 Pandemic (20)

Worldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsWorldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report Highlights
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / security
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
 
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017
 
2015-cloud-security-report-q2
2015-cloud-security-report-q22015-cloud-security-report-q2
2015-cloud-security-report-q2
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
MNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat LandscapeMNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat Landscape
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
comparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-papercomparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-paper
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS Mitigation
 
Radware Solutions for MSSPs
Radware Solutions for MSSPsRadware Solutions for MSSPs
Radware Solutions for MSSPs
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdf
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS Providers
 

More from NETSCOUT

There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalNETSCOUT
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service ProvidersNETSCOUT
 
RF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignRF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignNETSCOUT
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance NETSCOUT
 
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudNETSCOUT
 
nGeniusPULSE Quick Look
nGeniusPULSE Quick LooknGeniusPULSE Quick Look
nGeniusPULSE Quick LookNETSCOUT
 
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT
 
Hybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital TransformatiomHybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital TransformatiomNETSCOUT
 
Digital Transformation starts with Service Assurance
Digital Transformation starts with Service AssuranceDigital Transformation starts with Service Assurance
Digital Transformation starts with Service AssuranceNETSCOUT
 
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiNETSCOUT
 
Planning for a Digital Future
Planning for a Digital FuturePlanning for a Digital Future
Planning for a Digital FutureNETSCOUT
 
How to Select a Security Visibility Solution
How to Select a Security Visibility SolutionHow to Select a Security Visibility Solution
How to Select a Security Visibility SolutionNETSCOUT
 
Enterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left BehindEnterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left BehindNETSCOUT
 

More from NETSCOUT (16)

There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a Hospital
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers
 
RF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignRF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and Design
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance
 
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
 
nGeniusPULSE Quick Look
nGeniusPULSE Quick LooknGeniusPULSE Quick Look
nGeniusPULSE Quick Look
 
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
 
Hybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital TransformatiomHybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital Transformatiom
 
Digital Transformation starts with Service Assurance
Digital Transformation starts with Service AssuranceDigital Transformation starts with Service Assurance
Digital Transformation starts with Service Assurance
 
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
 
Planning for a Digital Future
Planning for a Digital FuturePlanning for a Digital Future
Planning for a Digital Future
 
How to Select a Security Visibility Solution
How to Select a Security Visibility SolutionHow to Select a Security Visibility Solution
How to Select a Security Visibility Solution
 
Enterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left BehindEnterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left Behind
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

DDoS Attacks Increased 25% During COVID-19 Pandemic

  • 1. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 1 DDoS Attacks in 2020 & Best Practices in Defense Tom Bienkowski Director Product Marketing Richard Hummel Manager, Threat Response
  • 2. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 2 DDoS Attacks – 1st Half 2020 Number Size Types Targets Protection
  • 3. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 3 NETSCOUT Cyber Threat Horizon https://www.netscout.com/horizon
  • 4. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 4 DDoS Attacks – 1st Half 2020 Number Size Types Targets Protection
  • 5. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 5 Number of DDoS Attacks Worldwide, Six-Month Review 2020 vs. 2019 ▪ Number of attacks 4.83M, 15% from 2019 Number of DDoS Attacks (Millions) 2019 2020 Q1 2.04 2.21 Q2 2.17 2.62 Total 4.21 4.83
  • 6. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 6 DDoS Attacks Increased During COVID-19 Lockdown Note: July was 828k…Is this a new normal?
  • 7. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 7 DDoS Attacks – 1st Half 2020 Number Size Types Targets Protection
  • 8. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 8 Size of DDoS Attacks Worldwide Six-Month Review 2020 vs. 2019 ▪ Largest attack 1.12Tbps, 77% bigger than largest in 2019 Peak Volume DDoS Attacks (Gbps) 2019 2020 Q1 510 488 Q2 634 1120
  • 9. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 9 Size of DDoS Attacks Worldwide Six-Month Review 2020 vs. 2019 ▪ Largest attack 1.12Tbps, 77% bigger than largest in 2019 Peak Volume DDoS Attacks (Gbps) 2019 2020 Q1 510 488 Q2 634 1120 Peak Speed DDoS Attacks (Mpps) 2019 2020 Q1 358 392 Q2 364 407 ▪ Largest attack 407 Mpps, 12% bigger than largest in 2019
  • 10. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 10 Size of DDoS Attacks Worldwide Six-Month Review 2020 vs. 2019 Vast majority of DDoS attacks are small-sized & short-lived.
  • 11. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 11 DDoS Attacks – 1st Half 2020 Number Size Types Targets Protection
  • 12. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 12 Types of DDoS Attacks The Internet BotNet Your ISP Firewall/VPN Your Data Center Legitimate Traffic State-Exhaustion Attacks ◦ Designed to target stateful devices (Load balancer, firewall, VPN, IPS) Volumetric Attacks ◦ Large (up to 1.2 Tbps) ◦ Designed to saturate links Application Layer Attacks ◦ Low and slow, stealth attacks ◦ Crashes application servers The modern-day DDoS attack is complex as it can dynamically uses 15+ vectors
  • 13. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 13 Different DDoS Attack Vectors
  • 14. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 14 Real World Examples of Multi-Vector DDoS Attacks StartDate StopDate Volume (Gbps) Speed (Mpps) Region Vectors Small-sized + short-lived + multi vector = Increase in Complexity
  • 15. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 15 DDoS Attacks – 1st Half 2020 Number Size Types Targets Protection
  • 16. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 16 Notable DDoS Attacks Per Industry Sector Worldwide, Six-Month Review 2020 vs. 2019 Industry #Attacks Max Volume Max Speed Avg Duration Telecommunications -18% -23% +13% -48% Data Processing , Hosting and Related +21% -20% -57% -15% Nonstore Retailers +43% -44% +48% +8% Hospitals +25% +255% +15% -3%
  • 17. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 17 Notable DDoS Attacks Per Country Worldwide, Six-Month Review 2020 vs. 2019 Country #Attacks Max Volume/ Max Speed Avg Duration United States +13% +8% +23% -21% United Kingdom +62% +39% -60% -56% Germany +233% +266% -36% -47% Canada -25% -42% -51% +31% ▪ The average volume and speed of attack traffic on a per second basis flowing in/out of these countries: ➢ US: 278.02 Gbps, 59.98 Mpps ➢ UK: 32.50 Gbps, 5.56 Mpps ➢ Germany: 136.67 Gbps, 22.89 Mpps
  • 18. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 18 Worldwide DDoS Attacks Worldwide, Six-Month Review 2020 vs. 2019 DDoS Attack Frequency: ➢ Number of attacks 4.83M, 15% from 2019 ➢ 25% during COVID-19 Pandemic lockdown DDoS Attack Size: ➢ Largest attack 1.12Tbps, 77% bigger than largest in 2019 ➢ However, vast majority of attacks are small, 74% attacks <1Gbps DDoS Attack Duration: ➢ Longest duration attack was 7 days ➢ However vast majority of attacks, 92% attacks last <1Hour Summary: DDoS Attacks Increase 25% in Frequency and Complexity During COVID-19 Pandemic DDoS Attack Vectors: ➢ 15+ vector attacks becoming more common. 1H 2020 Looks for more information when we release the next report at end of September!
  • 19. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 19 DDoS Attacks – 1st Half 2020 Number Size Types Targets Protection
  • 20. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 20 The modern-day DDoS attack is complex as it can dynamically uses 15+ vectors Types of DDoS Attacks The Internet BotNet Your ISP Firewall/VPN Your Data Center Legitimate Traffic State-Exhaustion Attacks ◦ Designed to target stateful devices (Load balancer, firewall, VPN, IPS) Volumetric Attacks ◦ Large (up to 1.2 Tbps) ◦ Designed to saturate links Application Layer Attacks ◦ Low and slow, stealth attacks ◦ Crashes application servers
  • 21. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 21 Stopping The Modern Day DDoS Attack Requires Intelligently Automated, Hybrid Protection 4 Backed by continuous threat intelligence. Your Data Centers/ Internal Networks The Internet ISP Network Scrubbing Center Volumetric Attack Automatically stop large attacks In-Cloud. 3 Automatic, intelligent communication between on-prem and cloud-based protection to address dynamic, multi-vector attacks. 2 State Exhaustion & Application Attack Automatically stop state exhaustion and application layer DDoS attacks on premises, in front of stateful devices (e.g. firewall/VPN concentrator) and application servers. 1 DDoS Protection The Internet Firewall/VPN Application Servers A Recommended Industry Best Practice:
  • 22. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 22 NETSCOUT Arbor Smart DDoS Protection Solution Your Data Centers/ Internal Networks The Internet ISP Network State Exhaustion & Application Attack AED is an on-premise, stateless, product that can stop all types of inbound DDoS attacks and outbound communication from compromised internal devices - providing a First and Last Line of Defense 1 AED’s Cloud Signaling can intelligently communicate with a cloud-based mitigation service (e.g. your ISP or Arbor Cloud) to stop the large attacks. 2 The Internet Firewall/VPN Application Servers Arbor Edge Defense (AED) Volumetric Attack Mitigate large attacks with ISP or Arbor Cloud which has 11 worldwide scrubbing centers with over 14 Tbps of mitigation capacity. 3 Arbor Cloud 4 Backed by continuous Threat Intelligence for ASERT/ATLAS and can be a fully managed services.
  • 23. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 23 THREAT INTELLIGENCE REPORT VISIT LINK FOR LATEST REPORT https://www.netscout.com/threatreport