当前位置:网站首页>Global communication infrastructure faces apt, robotics and DDoS; The weakest mobile network
Global communication infrastructure faces apt, robotics and DDoS; The weakest mobile network
2022-06-30 02:07:00 【zy18165754120】
according to Arbor Networks Of The first 8 Annual global infrastructure security report (WISR), High level persistent threat (APT) It's the number one consideration ; Distributed denial of service (DDoS) The scale of the attacks has stabilized , But it becomes more complicated ; Data centers and cloud services are particularly attractive targets ; Mobile operators continue to be passive in terms of network visibility .
The report also found that , Mobility is one of the biggest areas of insecurity in infrastructure :60% Of mobile operators are not aware of their mobile / Evolution group core ( For advanced 4G Deploy ) Of traffic .
“ Since the last survey , Limited visibility or investment improvements in detection and mitigation solutions for Mobile Networks ,”Arbor say .“ Before something goes wrong , The economics of consumer networks do not encourage providers to implement security measures .”
The company noted that , Overall speaking , The meaning of major threats varies by infrastructure area .“64% Of the survey participants said ,'DDoS Is the most important operational security issue we face today ,'” The company In its blog writes .“ Most respondents ranked fast-moving worms in second place , Domain name system (DNS) Loophole ( for example DNS poisoning ) In third place .”
It adds ,“DDoS Attacks are the first four problems , The result is the same as last year , Attack on customers is the most concerned issue .”
talk about DDoS,46% Of the respondents reported multi vector attacks : It's worrisome , Because they are often the most difficult to defend , And layered defense is required to successfully mitigate . However , The attack didn't get any bigger ——2012 The largest attacks reported in were 60 Gbps, And 2011 Same year ;2010 The peak attack in was 100 Gbps.
“ This year's results confirm , Application layer and multi vector attacks are continuing to develop , And the scale of capacity attack is becoming more and more stable ,”Arbor say .“ although 86% Reports on Web Application layer attacks on services , But the most worrying thing is that multi vector attacks are on the rise . Attackers have now turned to complex 、 Long standing 、 Multi vector attack —— A combination of attack vectors designed to break through an organization's existing defenses —— To achieve their goals .”
about 27% Of the respondents in their DNS Customers who have been affected on infrastructure DDoS attack —— And 2011 Annual survey 12% The number of respondents increased significantly .
On the whole DNS In terms of infrastructure ,71% Percent of the respondents said that in the 3 Tier and tier 4 Layers have good visibility , But only 27% Percent of the respondents said that in the 7 Layer visibility . This lack of visibility and the lack of specialized security personnel together constitute a perfect storm of vulnerability exploitation .
meanwhile ,Arbor Find out ,IPv6 Deployment is becoming more common . A full 80% Of CSP It means that they have either deployed IPv6, Or plan for the future 12 Within months .2011 year , The first batch of IPv6 DDoS Reports of attacks on production networks were exposed , but IPv6 Security incidents are still relatively rare .
“ in consideration of 75% Of the survey respondents were service providers ,IPv6 It is not surprising that deployment is accelerating today ,”Arbor say .“ This is for the attacker to pass through IPv4 and IPv6 Switching between networks to bypass network control offers new opportunities .”
Arbor Discovering advanced threats is a recognized problem for enterprise centric network operators . This year's survey found that , Increased focus on botnets on vendor networks , This is due to the pathology of these botnets 、 Evolution speed and intrusion detection system (IDS) And anti-virus (AV) The system is therefore not fully functional . Protect them . Investigation found , Looking forward to the future ,APT、 Industrial espionage 、 Data leaks and malicious insiders are even more serious .
meanwhile , It is as expected , Data centers and cloud services are increasingly suffering :94% Of data center operators reported attacks , and 90% Of data center operators report operating expenses as business impact .Arbor Warning , As more and more companies move their services to the cloud , They must now be alert to common risks and potential collateral damage .
According to the findings , This is directly related to the type of company targeted by the attacker , E-commerce and online game websites have more and more goals .
边栏推荐
- 210. Schedule II - depth traversal
- CheapSwap 协议的诞生
- 012_ switch
- Method of converting songs from DTS to MP3
- Varnish foundation overview 6
- Varnish foundation overview 5
- 207. curriculum - graph theory, depth traversal
- 004_ icon
- Varnish foundation overview 10
- What should I do when I feel confused after graduation from university?
猜你喜欢

DMX的配置

搞透AQS原理(流程圖及同步隊列圖解)

DTW learning (dynamic time warping) -- Thought and code implementation

Add a second network card (network interface NIC) for the virtual machine in azure portal in 2 minutes

What should I do when I feel confused after graduation from university?

Unity2d-- add keys to animation and bind events

Share the source code of the website of graduation student record

Restore a 35k-55k Tencent Android Senior Engineer Interview
![Scala basics [introduction and installation]](/img/c5/9e62070719e1e0db29b0e44b0f0bc1.png)
Scala basics [introduction and installation]
![[graph neural network] summary of graph classification study [3]: evaluation of graph classification methods and future research directions](/img/b1/2afa73a14b2f41b7a65c4c2d261e6a.png)
[graph neural network] summary of graph classification study [3]: evaluation of graph classification methods and future research directions
随机推荐
图解 Google V8 # 19 :异步编程(二):V8 是如何实现 async/await 的?
Restore a 35k-55k Tencent Android Senior Engineer Interview
Module import reload method
Varnish foundation overview 4
假离婚变成真离婚,财产怎么办
Write this number in C
搞透AQS原理(流程图及同步队列图解)
Varnish foundation overview 6
Tools and life services
MySQL monitoring 5
A keepalived high availability accident made me learn it again!
C language number prime
C language I want to pass
SCP remote copy command record
Is it safe to open an account in Sinosteel futures?
Conjecture of prime pairs in C language
(1)基础学习——图解pin、pad、port、IO、net 的区别
DMX configuration
【MySQL 04】使用MySQL Workbench 8.0 CE 備份及恢複Linux中的MySQL數據庫
9 - regular check set