Marzena Trembecka
Marzena Trembecka

DDoS attacks in the first half of 2017

Cyberattacks are a very serious hazard for companies, institutions and even private persons. Every year there are more sophisticated methods of attacks. The majority of attacks conducted in the first half of 2017 was multi-vector attacks on a large scale.

Verisign reports analysis: “Distributed denial of service trends report” and Neustar: “Worldwide DDoS attacks cyber insights research report” presents the cybersecurity level in the first half of 2017 compared to the previous years. Each report presents the thorough research of trends connected with DDoS type attacks (Distributed Denial of Service).

Decrease in the number of DDoS attacks

Verisign report demonstrates that in Q1 2017 there was 23% decrease in the number of DDoS attacks. Whereas, an average volume of the attack conducted was 26% higher than in the previous quarter. 14.1 Gbps – average volume of an attack in the first half of 2017. 30% of all the attacks lasted 3-5 hours.

Both Verisign and Neustar reports demonstrate that attacks are more frequently multi-vector ones. Verisign shows that 57% of all DDoS attacks conducted in Q1 2017 used 2 and more types of attacks (among others IP Fragment Attack, TCP Based, Layer 7). 46% are UDP based attacks.

Industries exposed to cyberattacks

Neustar analyses and segments attacks from 2016 and 2017 according to the following branches: Finances, Sales, Technology. Within each branch, there was approx. 10% increase in the number of attacks. This is a clear signal for each branch to improve data security what will limit financial losses in such sectors. Taking into account the impact of DDoS attacks hazard and comparing year 2016 and 2017, more and more companies decide to use dedicated anti-cyberattack security.

Multi-vector property, complexity and volume of attacks make fighting them more and more difficult. Each attack constitutes a different type of challenge; therefore, it is worth employing specialists in cybersecurity who will be continuously monitoring the traffic and will be able to distinguish human traffic from bot traffic.

Andrzej Prałat
Marzena Trembecka
×

For media

Provide us with contact details.

Thank you