DDoS Attack Size Soars, Volumes Are Up, Arbor Networks Finds

1 - DDoS Attack Size Soars, Volumes Are Up, Arbor Networks Finds
2 - Peak DDoS Attack Reported at 500G bps
3 - Most DDoS Attacks Saturate Bandwidth
4 - Service Providers Use Multiple Tools to Detect Threats
5 - Attacks Use Different Protocols for Reflection
6 - Port 80 Is the Primary Target
7 - Most Attacks Are Six Hours or Less
8 - The U.S. Is the Top Source and Target of Attacks
1 of 8

DDoS Attack Size Soars, Volumes Are Up, Arbor Networks Finds

Distributed denial-of-service attacks continue to grow in bandwidth volume, as attackers make use of different techniques to saturate defender bandwidth.

2 of 8

Peak DDoS Attack Reported at 500G bps

The peak DDoS attack reported by Arbor in 2015 came in at a new all-time high of 500G bps, up by 20 percent from the 400G bps reported for 2014.

3 of 8

Most DDoS Attacks Saturate Bandwidth

While many of the surveyed organizations can mitigate a DDoS attack rapidly, it still has an impact. A little more than half (51 percent) reported attacks that saturated their Internet connectivity.

4 of 8

Service Providers Use Multiple Tools to Detect Threats

Organizations use a number of tools to detect threats. More than three-quarter of respondents are using NetFlow-based analyzers and just over half use intrusion detection/intrusion prevention systems (IDS/IPS).

5 of 8

Attacks Use Different Protocols for Reflection

One of the primary ways that attackers are able to scale up DDoS incidents is by way of reflection and amplification of incorrectly configured services. Among the most often abused protocols for reflection and amplification are DNS and NTP.

6 of 8

Port 80 Is the Primary Target

Not surprisingly, port 80, the default Web server port for HTTP traffic, is the primary target for DDoS attacks.

7 of 8

Most Attacks Are Six Hours or Less

Just over half (52.9 percent) of organizations experienced DDoS attacks of six hours or less.

8 of 8

The U.S. Is the Top Source and Target of Attacks

The United States has the dubious distinction of being both the top source as well as the top target of DDoS activities in the world today.

Top White Papers and Webcasts