A new DDoS-reflex amplification attack has emerged in the DDoS attack mode , which uses some smart devices for reflex attacks based on the SSDP protocol, with an attack bandwidth magnification of up to 75 times. At home, online gaming has entered the top 3 of the DDoS attack target . in the annual DDoS attack event, the traffic for a single attack exceeds 100Gbps.
the root cause of a denial of service attack is The Internet architecture itself is flawed, as RFC 4732 says, "because the initial Internet architecture did not consider a denial of service attack , resulting in almost all Internet Services are vulnerable to denial of service attacks. " Throughout the last 5 years , the attack on both sides of DDoS attacks, the technology of the attackers has evolved, combining the "Big bully Small" (traffic type attack) with the "Small size" (resource exhausted Type) attack mode, using the increasing network bandwidth to enhance the attack and so on. , while the defensive side through the flow of cleaning equipment and other means to deal with.
the The DDoS threat report is regularly released by the Green Alliance Technology Threat Response Center to help you keep abreast of DDoS(distributed denial of service) threat development and to quickly understand and detect possible levels of damage after an attack, and to continuously strengthen cybersecurity awareness Perfect solution. This report is a year- round DDoS Threat report.
650) this.width=650; "Src=" http://www.cnitblog.com/images/cnitblog_com/gnaw0725/2014_NSFOCUS_DDoS_THREAT_REPORT_ Cover_v2.png "width=" "height=" 452 "longdesc=" http://www.cnitblog.com/gnaw0725/archive/2015/03/11/2014%E7%BB% Bf%e7%9b%9f%e7%a7%91%e6%8a%80ddos%e5%a8%81%e8%83%81%e6%8a%a5%e5%91%8a%e5%b0%81%e9%9d%a2 "style=" text-indent : 21pt; "/>
The report has been identified as following key findings
Smart Device Initiation A significant increase in the number of DDoS attacks
Guangdong is still the most serious victim area.
-23 points is the primary time period for DDoS attacks
UDP FLOOD become the main DDoS attack mode
Online games have entered Top 3 DDoS attack targets
93% DDoS attacks occur within half an hour
This report predicts the year
DDoS attack Peak traffic will be more innovative
Reflective Type DDoS attack technology will continue to evolve
DNS Service will usher in more DDoS attacks
for the industry DDoS attacks will persist
650) this.width=650; "Src=" http://www.cnitblog.com/images/cnitblog_com/gnaw0725/2014_NSFOCUS_DDoS_THREAT_ Report_infographic_s.png "width=" 640 "height=" 388 "longdesc=" http://www.cnitblog.com/gnaw0725/archive/2015/03/11/ 2014%e7%bb%bf%e7%9b%9f%e7%a7%91%e6%8a%80ddos%e5%a8%81%e8%83%81%e6%8a%a5%e5%91%8a%e4%bf%a1%e6%81%af%e5%9b%be "/
long-term tracking and analysis from the Green Alliance technology DDoS data shows that the attacker's behavior is constantly changing, and the evolution of the network environment makes the battlefield of attack and defense more complex. It is valuable to believe the views stated in the report to predict future attack patterns and to further refine the solutions of enterprises and organizations. For more information on the report, see: The Green Alliance technology DDoS Threat report
This article is from the "gnaw0725 blog" blog, please be sure to keep this source http://gnaw0725.blog.51cto.com/156601/1619570
2014 Green Alliance technology DDoS Threat Report