High-traffic attacks are growing, with more than hundred g of attacks
In recent years, the United States Federal Communications Commission (FCC) CC on broadband redefined, the downlink speed from 4Mbps to 25Mbps, the uplink speed from 1Mbps to 3Mbps. Internet users around the world have a 2008-2012 annual average growth rate of 12%, 2013 Internet users have surpassed 37.96% of the population, and the number of users is expected to exceed 3 billion in 2015.
Since Twelve-Five, with the implementation of the "broadband China" strategy, the urban and rural households broadband access capacity has gradually reached 20 megabits per second (Mbps) and 4Mbps, some developed cities reached 100Mbps, broadband for the first time to become a national strategic public infrastructure. According to CNNIC statistics, China's international export bandwidth shows a very rapid growth trend. Meanwhile, the size of China's internet users has risen sharply, averaging 7.2% per cent in 5 years, nearly 650 million in 2014.
The increase in broadband standards and the increased number of connected users (devices), while facilitating user use, also created conditions for the emergence of large-volume DDoS attacks, as well as the need for device vendors and consumers to upgrade their security awareness, which contributed to DDoS amplification attacks. These aspects have led directly to the increase in DDoS risk.
High-traffic attacks into the cloud, possible forms of cloud attack
As DDoS attacks rise, many users migrate their business to the cloud to protect against risk, and the benefits of cloud computing technology make cloud services widely available. China's public cloud service market is about 7.2 billion yuan, an increase of 47.5% from last year, according to a report by the Chinese Institute of Information and Communication research. China's private cloud market scale is also expanding, the domestic private cloud market in 2014 about 24.6 billion yuan, the growth rate of nearly 30%.
The increase in cloud services has brought convenience to users, as well as two changes in security, with 1 of clients lightweighting. The client's original computing task, the large-scale transfer to the cloud, the cloud will be more and more traffic, which will be exploited by the high-traffic DDoS attacks, 2 environment complications. As the business environment is virtualized, from a more flexible business to operations management, which creates new uncertainties, it can create opportunities for new forms of DDoS attacks.
Cloud computing DDoS Storm: High-traffic cloud attack