Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    How the DDoS Attack Landscape Continues to Shift

    By
    Sean Michael Kerner
    -
    August 26, 2015
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1How the DDoS Attack Landscape Continues to Shift

      1 - How the DDoS Attack Landscape Continues to Shift

      A new report from Akamai shows a 132 percent increase in the total volume of second-quarter DDoS attacks, compared with the same period last year.

      2More Than Half of Attacks Were Over HTTPS

      2 - More Than Half of Attacks Were Over HTTPS

      While HTTPS is generally considered a good thing for security because it provides encrypted data transport, it can also be used by attackers looking to breach an organization; 56 percent of attacks were over HTTPS.

      3Shellshock Was a Top HTTPS Attack Vector

      3 - Shellshock Was a Top HTTPS Attack Vector

      The Shellshock vulnerability, first disclosed in September 2014, was actively being exploited by attacks over HTTPS in the second quarter of 2015.

      4SQL Injection Is the Top HTTP Attack Vector

      4 - SQL Injection Is the Top HTTP Attack Vector

      Looking at regular HTTP Web traffic, SQL injection (SQLi) is the top attack vector, followed by local file inclusion (LFI).

      5Most DDoS Attacks Are Infrastructure Layer

      5 - Most DDoS Attacks Are Infrastructure Layer

      The vast majority (90 percent) of DDoS attacks targeted the infrastructure layer, while 10 percent affected the application layer.

      6Large DDoS Affected Internet and Telecom

      6 - Large DDoS Affected Internet and Telecom

      Ten out of twelve DDoS attacks of 100G bps or higher targeted the Internet and telecom industry. Among the largest DDoS attacks in the second quarter was a 249G-bps attack on April 3 that targeted an Internet and telecom company.

      7Gaming Is a Top DDoS Target

      7 - Gaming Is a Top DDoS Target

      While high-bandwidth DDoS attacks affected Internet and telecom organizations significantly in the second quarter, based on frequency, the gaming industry is still the most targeted overall, representing 35 percent of attacks in the second quarter.

      88 in 10 Web Application Attacks Are Against the U.S.

      8 - 8 in 10 Web Application Attacks Are Against the U.S.

      While Web application attacks are a global problem, the United States remains the top target—representing 81 percent of attacks in the second quarter of 2015.

      9DDoS Attacks Made in China

      9 - DDoS Attacks Made in China

      During the second quarter, Akamai reported that 37 percent of all DDoS attacks originated in China.

      PrevNext

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×