当前位置:网站首页>Blitzkrieg companies with DDoS attacks exceeding 100gbps in 2014
Blitzkrieg companies with DDoS attacks exceeding 100gbps in 2014
2022-06-30 02:07:00 【zy18165754120】
according to Arbor Networks The latest statistics of ,2014 More than occurred in the first half of the year 100Gbps The capacity of DDoS Maximum number of attacks , Although the average size has decreased since the first quarter .
The company's active threat level analysis system (ATLAS) from 290 Multiple ISP collecting data , And discovered in the first six months of this year 111 More than 100Gbps Of DDoS event .
It also revealed , This year more than 20Gbps The number of attacks has been 2013 Annual report for the year 2,573 More than twice the number of incidents .
Arbor Express , Attack duration has also been increased —— From the first quarter average 54 Minutes to the second quarter 98 minute , exceed 10Gbps The attack of .
In terms of attack source , Korea to 15.1% leading , It has increased since the first quarter 2.6%, The United States to 14.8% The share of , It has increased since the first three months of this year 3.8%.
Next is China , Occupy DDoS The attack 6.7%, since 2014 It has grown since the first quarter of 2.8%.
It must be mentioned that , Thanks to anonymization and distribution technology , about 34% The monitored event of cannot be controlled by Arbor attribution .
However , Not all bad luck and pessimism , The scale of the attack is 2014 During the first six months of the year, it decreased .
The average attack size is down from the first quarter 47%, And the largest attack scale has decreased 101%, from 325Gbps Down to 155Gbps.
NTP Amplification attacks seem to be decreasing . They now account for all DDoS The event 6%, Less than in the first quarter 14%, Account for more than 10Gbps Of attack 34%, Less than three months ago 56%.
Arbor According to , When more than 100Gbps When you attack ,NTP Zoom in is becoming increasingly unpopular , Such events account for 49%, The share in the first quarter was 85%.
This backs up data from other sources .DDoS Defense company NSFOCUS It was reported last month that ,3 Global vulnerability in January NTP The number of servers is about 21,000 platform , And then in 5 The month fell further to 17,600 platform .
Last year 12 Found in the month 432,120 Comparison , This is a significant reduction , And in US-CERT Warning that attackers abuse vulnerable NTP Server to overwhelm the victim IT After the system .
边栏推荐
- Is online stock trading safe? Do you need to open an account for stock trading?
- Leetcode 46 Full arrangement (February 15, 2022)
- Varnish foundation overview 7
- If mybaits cannot query the data, it can query how to change it in the database
- Widget uses setimageviewbitmap method to set bug analysis
- Tencent released the first Office Photo 23 years ago. It's so chronological
- What are the payment and distribution systems?
- Electron FAQ 54 - make your own fireworks based on electron
- Is the processor the main factor in buying a mobile phone?
- MySQL monitoring 5
猜你喜欢

搞透AQS原理(流程图及同步队列图解)

C language irony
![[graph neural network] summary of graph classification study [3]: evaluation of graph classification methods and future research directions](/img/b1/2afa73a14b2f41b7a65c4c2d261e6a.png)
[graph neural network] summary of graph classification study [3]: evaluation of graph classification methods and future research directions

JS reverse case -rus5 logic learning

【银河麒麟V10】【桌面】火狐浏览器设置主页不生效

Gesture digital enlightenment learning machine

Comprendre le principe AQS (organigramme et schéma de file d'attente synchrone)
![[Galaxy Kirin V10] [desktop] Firefox browser settings home page does not take effect](/img/96/e3afb2b9683cce7645afd483cc0844.png)
[Galaxy Kirin V10] [desktop] Firefox browser settings home page does not take effect

Jenkins continuous integration environment build 8 (configure mailbox server to send build results)

想转行,但不知道自己要做什么工作比较好?
随机推荐
Geotools wkt coordinate system conversion
Derivation of univariate polynomial in C language
7 — filter
widget使用setImageViewBitmap方法设置bug分析
Unity2D--给动画添加关键帧并绑定事件
Is it safe to open an account in Sinosteel futures?
[mrctf2020]ezpop-1 | PHP serialization
[machine learning Q & A] cosine similarity, cosine distance, Euclidean distance and the meaning of distance in machine learning
DTW学习(dynamic time warping)——思想、代码实现
[graph neural network] overview of graph classification learning [2]: graph classification based on graph neural network
Conjecture of prime pairs in C language
Add a second network card (network interface NIC) for the virtual machine in azure portal in 2 minutes
Varnish foundation overview 6
208. implement trie (prefix tree) - attach detailed notes
Understand AQS principle (flow chart and synchronous queue diagram)
C language number prime
工具与生活服务
【二叉树】最大二叉树 II
Circular right shift of array elements in C language
Module import reload method