<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">

DDoS Threat Report 2017 Q2

UDP-based (user datagram protocol) attacks increased by 15 percent this quarter, targeting hijacked devices connected to the Internet of Things (IoT).

  • UDP-based (User Datagram Protocol) attacks accounted for 77.4%, representing a 15% increase over Q1.
  • 23.68% of attacks targeted a single vector, while the rest (76.32%) were blended, multi- vector attacks.
  • More than 64% of attacks lasted less than 90 minutes; only 2.3% lasted longer than 1,200 minutes (20 hours).
  • 90% of attacks were smaller than 10Gbps (that’s large enough to knock a firewall or IPS offline, or take down networks that don’t have high-capacity, anti-DDoS mitigation).
  • About 34% of attacks originated from the People’s Republic of China (PRC), while 20.9% and 10.1% had IP sources, respectively, in the US and Switzerland.
  • Within the Asia Pacific region (APAC), about 75% of attacks originated from the PRC, 11% from Hong Kong, and 3.5% from Australian IP addresses.
2017_Q2

 

UDP Flood (User Datagram Protocol) was the most common DDoS method used in the quarter, surging 168% beyond Q4 2016’s level. Similar to SYN Flood by nature, UDP Flood is faster, simpler, and cheaper to launch through botnets, including hijacked IoT devices. It can also easily be manipulated to leverage an amplification factor to increase the attack size exponentially. The spread of IoT botnets over the past year is believed to have fueled the substantial growth of UDP-based attacks in recent quarters.

You may be interested in

DDoS Statistical Report for 2021

In 2021, the total attack count and average attack size both fell by 13.32% and 50.00% respectively compared to the figures registered in 2020. Compared to 2020, the maximum attack size increased by 296.62%, with the maximum attack size clocking in at 699.20 Gbps. Besides, Read More >

DDoS Threat Report 2021 Q3

Q3 saw a notable trend in which attackers launched DDoS attacks at single targets within a CSP, attributing an attack size increase of 544% QoQ and 232% YoY. Over 55% of attacks focused on hitting a specific service with high volumes of traffic simultaneously, and according to our research, sever...

DDoS Threat Report FHY 2021

Small bit-and-piece DDoS attacks boomed by 233% in the first half of 2021. As the pandemic carried on into 2021, hackers experimented with new attack patterns to avoid signature-based detection. More than 99% of all DDoS attacks were smaller than 10Gbps, as we had predicted in 2020. These small, ...

Annual Threat Report 2020

This annual report is to review a year that was defined by arguably the worst pandemic the world has seen in 100 years. We look back at some of the key insights, findings and trends covered in our previous quarterly reports, and how COVID-19 impacted not only cybersecurity, but also the way we no...

DDoS Threat Report 2020 Q3

The increase in online gaming attracted attention from attackers, resulting in nearly 77% of cyber attacks targeting online gaming and gambling industries in Q3 2020. More than a third of these entertainment attacks focused on online gaming targets. Nexusguard analysts also reported a 287% increa...