当前位置:网站首页>Blitzkrieg companies with DDoS attacks exceeding 100gbps in 2014
Blitzkrieg companies with DDoS attacks exceeding 100gbps in 2014
2022-06-30 02:07:00 【zy18165754120】
according to Arbor Networks The latest statistics of ,2014 More than occurred in the first half of the year 100Gbps The capacity of DDoS Maximum number of attacks , Although the average size has decreased since the first quarter .
The company's active threat level analysis system (ATLAS) from 290 Multiple ISP collecting data , And discovered in the first six months of this year 111 More than 100Gbps Of DDoS event .
It also revealed , This year more than 20Gbps The number of attacks has been 2013 Annual report for the year 2,573 More than twice the number of incidents .
Arbor Express , Attack duration has also been increased —— From the first quarter average 54 Minutes to the second quarter 98 minute , exceed 10Gbps The attack of .
In terms of attack source , Korea to 15.1% leading , It has increased since the first quarter 2.6%, The United States to 14.8% The share of , It has increased since the first three months of this year 3.8%.
Next is China , Occupy DDoS The attack 6.7%, since 2014 It has grown since the first quarter of 2.8%.
It must be mentioned that , Thanks to anonymization and distribution technology , about 34% The monitored event of cannot be controlled by Arbor attribution .
However , Not all bad luck and pessimism , The scale of the attack is 2014 During the first six months of the year, it decreased .
The average attack size is down from the first quarter 47%, And the largest attack scale has decreased 101%, from 325Gbps Down to 155Gbps.
NTP Amplification attacks seem to be decreasing . They now account for all DDoS The event 6%, Less than in the first quarter 14%, Account for more than 10Gbps Of attack 34%, Less than three months ago 56%.
Arbor According to , When more than 100Gbps When you attack ,NTP Zoom in is becoming increasingly unpopular , Such events account for 49%, The share in the first quarter was 85%.
This backs up data from other sources .DDoS Defense company NSFOCUS It was reported last month that ,3 Global vulnerability in January NTP The number of servers is about 21,000 platform , And then in 5 The month fell further to 17,600 platform .
Last year 12 Found in the month 432,120 Comparison , This is a significant reduction , And in US-CERT Warning that attackers abuse vulnerable NTP Server to overwhelm the victim IT After the system .
边栏推荐
- Is the processor the main factor in buying a mobile phone?
- Pytoch modifies the hook source code to obtain per layer output parameters (with layer name)
- 7 — filter
- 33Mysql
- Circular right shift of array elements in C language
- Sorting out the usage of transforms in pytoch
- Summary of DOM
- 001_ layout
- [MRCTF2020]Ezpop-1|php序列化
- MySQL monitoring 5
猜你喜欢

Thinking carefully and fearfully: a software can be transmitted online to monitor whether employees want to "run away"

After the blueprint node of ue5 is copied to UE4, all connections and attribute values are lost

Share the source code of the website of graduation student record

002_ container

搞透AQS原理(流程圖及同步隊列圖解)

26.算法常用面试题

001_ layout

Jenkins continuous integration environment build 8 (configure mailbox server to send build results)
![Scala basics [introduction and installation]](/img/c5/9e62070719e1e0db29b0e44b0f0bc1.png)
Scala basics [introduction and installation]

Learning C language from scratch day 026
随机推荐
What problems can cloud storage architecture solve for Devops?
33Mysql
Yyds dry inventory consistent and smooth zoom type and spacing
Summary of DOM
26. common interview questions of algorithm
012_ switch
8 — router
Est - ce que la bourse en ligne est sécurisée? Dois - je ouvrir un compte pour la spéculation boursière?
MySQL monitoring 2
Varnish foundation overview 5
Circular right shift of array elements in C language
C language I want to pass
搞透AQS原理(流程圖及同步隊列圖解)
谁再用Redis过期监听实现关闭订单,立马滚蛋!
013_ slider
207. curriculum - graph theory, depth traversal
Unity2D--给动画添加关键帧并绑定事件
Varnish foundation overview 2
Jenkins continuous integration environment construction VII (Jenkins parametric construction)
Restore a 35k-55k Tencent Android Senior Engineer Interview