Is 2017 a crisis year for DDoS attacks?

DDoS attacks are not new, but 2016 marked a rise in their sophistication and magnitude. Last year witnessed a number of prominent distributed denial of service (DDoS) attacks, including one attack against DNS provider Dyn. This attack leveraged a Mirai botnet of 100,000 infected devices and caused several high-profile websites including Spotify and Twitter to go offline for several hours1.

Naturally, there's a concern that such threats will continue to intensify this year. Deloitte, for instance, warns that 2017 will be a crisis year for DDoS attacks, with a greater frequency, scale and severity of attacks than in years prior. In fact, they expect over 10 million DDoS attacks in 2017, with an average attack size of 1.25 to 1.5 gigabits per second!2

The numbers are certainly alarming. But instead of panicking at the statistics, organizations will be better off if they understand what is causing the recent upsurge in DDoS attacks, and what defensive measures they should take to mitigate the threat.

What's causing the upsurge in DDoS attacks?

One major factor responsible for the increase in DDoS attacks is the growing number of Internet of Things (IoT) devices, such as smart security cameras, smart televisions or even smart thermostats, which are insecure and can therefore be integrated far more easily by hackers into a botnet than computers, servers or smart phones. The Mirai botnet attack mentioned earlier leveraged precisely these sorts of IoT devices.

Another factor is the significant increase in bandwidth capacity and broadband speeds in recent years, especially in the West. With greater speed and bandwidth available, hackers can send more data quicker with the devices they hijack for their botnets.

Lastly, especially on the Dark Web, there are many easy-to-use malware tools available, such as Mirai, which even relatively inexperienced hackers can employ and launch attacks with3.

How can organizations defend against DDoS attacks?

Here are several ways organizations or businesses can lower the risk of being affected by DDoS attacks.

Choosing a cloud service provider that provides robust anti-DDoS protection

Organizations nowadays store much of their data and applications on the cloud. To protect their online assets from malicious attacks, organizations should pick cloud service providers that provide robust anti-DDoS protection as part of their service. Alibaba Cloud, for instance, offers basic anti-DDoS protection to all of its users free of charge. Furthermore, unlike some other cloud providers, Alibaba Cloud's security features are developed in-house rather than by third parties, which allows Alibaba Cloud to ensure maximum levels of security.

Dispersing the location of data

It's recommended that organizations don't store all of their data on a single server or data center. When a large amount of data is concentrated in a single location, it is easier for hackers to identify and select as a target for DDoS attacks. Data should thus ideally be decentralized and dispersed in multiple locations, for example by keeping sensitive and non-sensitive data in different zones.

Analyzing incoming traffic patterns

Any incoming traffic to an organization's servers should be closely monitored, particularly when there is a surge of traffic. Any substantial surge of traffic coming from a new geographic location should be viewed with caution and may indicate a potential DDoS attack. An experienced IT team should be able to determine whether this is the case.

Utilizing blacklists and whitelists

Once illegitimate and harmful traffic has been identified, it should be added to a blacklist and blocked. A blacklist prevents access to a network from any IP address on the list. A whitelist provides a similar function, except it allows (rather than blocks) IP addresses on the list to access the network. Both blacklists and whitelists can mitigate against DDoS attacks by filtering traffic and keeping intruders out. However, it's important to make sure that legitimate traffic is not accidentally blocked through these lists.

1https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/5-significant-ddos-attacks-2016/
2https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Technology-Media-Telecommunications/gx-deloitte-2017-tmt-predictions.pdf
3 Ibid

时间: 2024-08-16 09:25:07

Is 2017 a crisis year for DDoS attacks?的相关文章

阿里云:游戏行业DDoS态势报告(2017年上半年)

"DDoS attacks have become tools of 'war'", 新闻周刊在一篇关于游戏行业DDoS攻击的评论中提到. 如果DDoS的攻防双方,构筑了网络世界中的一个"战局",那么主战场之一,就是游戏行业:再聚焦,战场的炮火中心,就是中国的游戏行业. 据全球游戏和全球移动互联网行业第三方分析机构Newzoo的数据,2017年,中国以275亿美元的游戏市场收入,超过美国和日本,成为全球榜首. 行业快速的增长,高额的攻击利润,不断攀升的行业竞争,让中

2017年第一季度DDoS攻击报告:中国依然是黑客的最爱

本文讲的是2017年第一季度DDoS攻击报告:中国依然是黑客的最爱, 由于物联网僵尸网络的兴起,DDoS攻击也变得普遍起来.根据A10公司的网络调查显示,今年由物联网而引起的DDoS攻击已经达到了有史以来的最高纪录,在每次攻击中,都有数十万台连接到互联网的家用设备被DDoS攻击利用. 不过,面对DDoS的越来越迅猛的攻击之势,我们对它的防御明显还很不足.这可以从几个环节中一窥得知,对于物联网设备供应商来说,他们虽然已经开始在自己的产品中加强信息安全方面的保护了,但是很明显效果不是很明显.不过,我

绿盟科技网络安全威胁周报2017.33 关注Foxit PDF Compressor installer DLL预加载漏洞CVE-2017-12892

绿盟科技发布了本周安全通告,周报编号NSFOCUS-17-32,绿盟科技漏洞库本周新增67条,其中高危7条.本次周报建议大家关注 Foxit PDF Compressor installer DLL预加载漏洞 .目前,厂商已发布更新程序,请使用Foxit PDF Compressor的用户及时升级修复. 焦点漏洞 Foxit PDF Compressor installer DLL预加载漏洞 NSFOCUS ID 37423 CVE ID  CVE-2017-12892 受影响版本 Foxit

绿盟科技网络安全威胁周报2017.09 请关注MSIE Edge任意代码执行漏洞CVE-2017-0037

绿盟科技发布了本周安全通告,周报编号NSFOCUS-17-09,绿盟科技漏洞库本周新增41条,其中高危16条.本次周报建议大家关注Microsoft Internet Explorer/Edge任意代码执行漏洞 CVE-2017-0037 .攻击者通过精心构造的网页可以达到远程代码执行的目的.目前尚无任何补丁,建议大家暂时停用IE和Edge. Microsoft Internet Explorer/Edge任意代码执行漏洞 NSFOCUS ID 35978 CVE ID CVE-2017-003

绿盟科技网络安全威胁周报2017.24 关注Windows LNK文件远程代码执行漏洞CVE-2017-8464

绿盟科技发布了本周安全通告,周报编号NSFOCUS-17-24,绿盟科技漏洞库本周新增109条,其中高危93条.本次周报建议大家关注 Windows LNK文件远程代码执行漏洞 .微软官方已经在6月份发布的安全补丁中修复了此漏洞,受影响的用户应立即通过Windows自动更新服务来下载更新该安全补丁来防护.对于无法及时更新补丁的主机,建议禁用U盘.网络共享的功能. 焦点漏洞 Windows LNK文件远程代码执行漏洞 NSFOCUS ID  36895 CVE ID  CVE-2017-8464

How to Prevent WordPress Bounce Attacks with an Old yet Powerful Trick

Bounce attacks are a very tricky type of DDoS attacks. However, we can learn a lot from it when we take a deep dive into its technical make up and can better understand the logic and features of a bounce attack. This article aims to offer a bit more

Protect Your Website: How to Avoid SMS Traffic Flooding Attacks

Business is taking off. You are hiring new people, expanding your customer base and you have just bought a new work van to handle the recent spike in orders.  Purchasing the vehicle is a significant investment for your business, including the extra e

游戏安全资讯精选 2017年 第六期:Akamai报告称游戏是流量型攻击的主要受害者,英国二手游戏经销商CeX漏洞遭利用,MongoDB等数据服务被劫持勒索风险预警,网络安全上榜五大稀缺职业

  [每周行业DDoS攻击态势]     [游戏安全动态] Akamai发布2017年Q2互联网安全态势报告,游戏是流量型攻击的主要受害者.点击查看原文   点评:其中比较有趣的发现是:在Q2的 4051次DDoS攻击中,99%是流量型攻击Q2,DDoS 攻击数目增加了约 28% ,打破了前三个季度,DDoS 攻击数量连续下降的趋势:流量型攻击中,来自埃及的源IP占源IP总数的32%:流量型攻击中,游戏类客户是主要的受害者,占比81%.阿里云日前发布的2017年上半年游戏行业DDoS态势报告中,

市场咨询机构Frost&Sullivan预计 DDoS缓解市场未来5年复合增长17.1%

市场咨询机构Frost & Sullivan发现, DDoS 缓解市场在2016年产生了8亿1600万美元的收入, 预计到2021年,将会年复合增长17.1% . DDoS 缓解市场趋势 威胁行为者不断开发新的技术, 以压倒其目标的防御, 并提高其 DDoS攻击 的规模.频率.隐蔽性和复杂性等方面的有效性, 这些都是推动快速增长的因素.(小编,这个方面请参看 Talos实验室深入我国DDoS黑市DuTe ,揭露各种DDoS团伙.平台.工具及攻击 ) 什么是DDoS缓解 在<破坏之王>(