Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Number of DDoS Bots That Can Bypass Mitigation Tools Rises to 36 Percent
#1
[Image: number-of-ddos-bots-that-can-bypass-miti...3295-2.png]
During the first three months of the year, DDoS protection firm Imperva observed a series of interesting trends regarding the DDoS landscape. According to the company's latest quarterly report, both network layer and application layer attacks grew in size and sophistication.

One of the rising trends is for Mpps network layer DDoS floods. Mpps stands for "Millions of packets per second" and refers to attacks targeting networking equipment by sending massive amounts of packets, not necessarily enough to clog up the company's bandwidth, but sufficient to overwhelm and crash networking equipment such as switches and routers.
"Network layer multi-packet attacks may be the next hot trend"

Imperva experts say they mitigated on average a 50+ Mpps DDoS attack every four days and 80+ Mpps attacks every eight days.

"We estimate that high Mpps attacks are being used as an attempt to circumvent current-gen DDoS mitigation solutions," Igal Zeifman, senior inbound marketing manager for Incapsula explained.

"By now, the majority of mitigation services and appliances are highly effective in dealing with high Gbps assaults. However, [...] many of the same solutions are not be as capable of dealing with high Mpps scenarios, as they weren’t designed with high packet processing rates in mind."

Another trend observed in network-level DDoS attacks includes the growth of multi-vector attacks. Imperva says that 33.9 percent of all the DDoS attacks it detected in Q1 2016 were multi-vector. A previous report by Neustar for Q4 2015 had this number at 17 percent.
"Application layer attacks are getting smarter"

On the other hand, for application-level attacks, Imperva says that it saw a rise both in the size of these attacks and their sophistication.

At the start of the month, the same Imperva was reporting on a new record for Layer 7 DDoS attacks set by the Nitol botnet.

Looking back over the entire quarter, besides this size increase, Imperva also noticed another trend. Botnet operators are beginning to deploy smarter bots (malware that infects computers to launch DDoS attacks).

In the first three months of the year, Imperva saw bots that could accept and hold cookies and bots that can parse JavaScript code in 36.6 percent of all the DDoS traffic. This same number was only 6.1 percent in Q4 2015.

The reason is that DDoS mitigation services use either cookies or JavaScript code to distinguish between actual users (browsers) and automated traffic, so adding these capabilities to DDoS bots allow them to circumvent some protection systems. Imperva says that, in most of the detected cases, DDoS bots were masked as Chrome and Firefox using fake user agent strings.

For more details, Softpedia readers can check out Imperva's Global DDoS Threat Landscape Q1 2016.
[Image: number-of-ddos-bots-that-can-bypass-miti...3295-5.png]
source
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  (Kaspersky ) Top 10 countries with the largest number of threats of selected type mrtrout 0 572 02-04-2023 , 05:43 AM
Last Post: mrtrout
  Low-Detection Phishing Kits Increasingly Bypass MFA Mohammad.Poorya 0 900 02-04-2022 , 05:29 PM
Last Post: Mohammad.Poorya
  DDoS attacks hit multiple email providers mrtrout 0 1,138 10-23-2021 , 09:03 AM
Last Post: mrtrout
  61 percent of employees fail basic cybersecurity quiz Bjyda 0 746 04-13-2021 , 05:06 PM
Last Post: Bjyda
  Microsoft Defender adds automatic Exchange ProxyLogon mitigation tarekma7 0 733 03-19-2021 , 01:23 PM
Last Post: tarekma7

Forum Jump:


Users browsing this thread: 1 Guest(s)