Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 4 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Average DDoS attack is 5Gbps and lasts for 30 minutes

by The Gurus
March 23, 2015
in Editor's News
Share on FacebookShare on Twitter

Businesses face an average of 3.9 distributed denial-of-service (DdoS) attacks a day, with 96 per cent of attacks lasting for less than half an hour.
According to the inaugural quarterly DDoS trends and analysis report from Corero Network Security, short bursts of attack traffic instead of prolonged events and partial link saturation attacks have become more common. The report, based on real customer data, said that one customer in particular experienced an average of 12 attacks per day across its multi-data centre environment during the three-month time period.
Speaking to IT Security Guru, Dave Larson, CTO and vice president, product at Corero Network Security said that the figures are based on customer reports and what it sees is some are attacked once a week some not at all, but they are uncommon, and a high percentage are attacked daily, if not constantly.
He said: “During as DdoS, everything is spoofed and hidden and it is hard to find the attacker. In almost all cases a DdoS is about not denying services, and in some cases we see DdoS used as a smoke screen to do other things, such as degrading the firewall and forcing the intrusion prevention system into fallback mode.”
Another key finding of the report was that 96 per cent of attacks last for only 30 minutes, which Larson said was clever as the process of moving the traffic over to scrubbing can take up to 30 minutes, by which time the attack has ended but soon after another attack can begin.
“In five minutes you can send millions of malicious packets that will saturate the logs,” he said. “As the tools are distributed, it is hard to run reconnisance on the network to determine what to do.” Larson said that often it can take an analyst 90 minutes to deal with a five minute attack, but five minutes is enough time to exploit a vulnerability in SSL or place an APT on the network.
Additionally, 79 per cent of DDoS attack attempts targeting Corero’s customers between October 1st and December 31st, 2014 were less than 5Gbps in peak bandwidth utilisation. Larson said that in the five minute log saturation attack, if you look at logs you will see “five minutes of garbage!”
Larson said: “As our customers’ experiences indicate, the regularity of these attacks simply highlights that there is a growing need for protection that will properly defeat DDoS attacks at the network edge, and ensure the accessibility required for the Internet connected business, or the internet providers themselves.
“Just because you are not experiencing a DdoS, now, it doesn’t mean it is not a problem for you.”

FacebookTweetLinkedIn
Tags: attackDDoSNetwork
ShareTweetShare
Previous Post

Victims of Target must prove damage to claim compensation

Next Post

PoSeidon malware poses fresh retail threat

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information