In the third quarter of 2015, 46% of DDoS attacks came from Linux computers.
According to research reports from Kaspersky Labs and Imperva in the third quarter of this year, DDoS attacks have become a very frequent topic and even mask many more serious attacks, it becomes an important means of extortion and interference to enterprises or competitors.
The Kaspersky Lab's third quarter of 2015 DDoS Intelligence Report Q3 2015 is worth noting that Linux devices are increasing in the scope of DDoS attacks. Although we saw the first time Linux servers were added to the DDoS botnet about a month ago, there were a lot of similar tools on the market. Kaspersky said that 45.6% of DDoS attacks come from Linux computers.
Kaspersky also recorded that a customer suffered 320 hours of attacks, and another Dutch company suffered 22 attacks. In addition to such extreme cases, most attack events consume less bandwidth and take less than 24 hours. About 91.6% of attacks target users in 10 countries: china, the United States, South Korea, Russia, Vietnam, Croatia, Canada, Japan, the Netherlands and France.
At the same time, China, the United States and South Korea are also the main sources of attacks. Most DDoS attacks use SYN, TCP, and HTTP packets.
The Imperva study points out that compared with the second quarter of this year, network-layer DDoS attacks increased by 108.5% in the quarter, affecting at least Gbps of speed every day, record that the peak bandwidth usage of an attack reaches 260 Gbps. At the application layer, 62.3% of DDoS attacks are hidden at the browser level.
According to Kaspersky's report, China is currently the main source of DDoS attacks, and the United States is the most important target of such attacks.
This article permanently updates the link address: