Mobile App Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 18 October 2013

Large DoS Attacks More Than Quadruple in 2013: Study

Posted on 09:32 by Unknown
 By Robert Lemos | Posted 2013-10-17 eWeek

 

The majority of denial-of-service attacks now exceed 1G bps, according to a new report from Arbor Networks. While the vast majority of denial-of-service attacks continues to be the typical background "noise" of rival gamers, online criminals and Internet vandals causing problems for each other, the more serious, higher-bandwidth attacks have quadrupled, according to a quarterly report released Oct. 16 by Arbor Networks.

Denial-of-service (DoS) attacks exceeding 20G bps, which will overwhelm almost any online service's bandwidth, more than quadrupled so far in 2013, compared with the previous year, according to the network management firm. While the attacks account for only approximately 1 percent of all data floods, the increase in large-bandwidth DoS attacks suggests that more serious groups are now using denial of service as a common tactic.

The surge in the number of "over 20G bps attacks shows that you have a lot of activity driven by other motivations," Dan Holden, Arbor's director of security research, told eWEEK. "That number increasing that much is showing that there is a lot of growth in more serious attack motivations."

Denial-of-service attacks are increasingly used as part of hacktivism and cyber-criminal campaigns in a variety of ways. Extortion scams used packet floods to overwhelm online gambling, retail and other sites that quickly lose money if their customers cannot connect; paying the ransom will allegedly stop the attacks, for a while. Online thieves use DoS attacks to distract defenders at financial institutions, so they are less vigilant during account thefts. Hacktivists, such as the al Qassam Cyber Fighters, disrupted financial institutions to incur costs to Western companies.
Yet most attacks are gamers who use short DoS attacks to kick opponents offline during a game, rival cyber-criminal organizations who seek advantage in the underground and Internet vandals who do it for fame. These "short, sharp" attacks have dominated packet floods, according to Holden. While the bandwidth used by the average DoS attack jumped 78 percent, seven out of every eight attacks lasts less than an hour."Historically, most of your DDoS [distributed denial of service]... is gamers and is very typical of what we all did on IRC [Internet Relay Chat] in the '90s," Holden said. Online arguments among early hackers occasionally devolved into battles to kick each other offline. "If you have enough bandwidth at home, or a small botnet, you can easily take someone offline."

Attacks that used bandwidth of more than 10G bps accounted for more than 4 percent of all attacks, while the largest confirmed DoS attack topped 191G bps, according to Arbor. Those more serious packet floods lasted 2 hours and 17 minutes on average, the report stated.

While larger-bandwidth attacks are becoming the norm, Holden pointed out that the increases are partially offset by the growth in capacity of the Internet. In many ways, attackers have to increase the size of their attacks just to have the same impact as in the past, he said.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Industry News, James Jones, networking security, Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • LearningWorks: THE MISSING PIECE: Quantifying Non-Completion Pathways to Success
    ” . . . in the California Community College system . . . nearly one-third of students took an average of just two courses over about two yea...
  • Cisco Career Certifications Awarded American National Standards Institute Accreditation
    Achievement Demonstrates Compliance With Rigorous, Internationally Recognized Standards SAN JOSE, CA--(Marketwire - Jan 16, 2013) - Unders...
  • CyberWatch West Free Student 2 Student Webinar October 30th
    Online Workshop Oct 30 at 10:30 am PDT Man-in-the-Middle Attacks Using Mobile Devices Register @ cyberwatchwest.webex.com Student 2 Student ...
  • Spring 2013 NEW CCCApply Webinar Series
      Monday, 28 January 2013, TechEDge Written by Tim Calhoon Saturday, 26 January 2013 The New CCCApply online admissions application...
  • Community college grads out-earn bachelor's degree holders
    By Jon Marcus at The Hechinger Institute @CNNMoney February 26, 2013: 6:23 AM ET Nearly 30% of Americans with associate's degrees now ...
  • ACM CCECC Alice Summer Workshops Registration now open
    Registration has opened for the Alice Summer Workshops! A week has been set aside for a Community College focused workshop at Walt Disn...
  • CA Career Cafe: CALJOBS Job Search Service Now Available
    “ Somewhere someone is looking for exactly what you have to offer. ”                                                                    - ...
  • Code.org Launches To Help Make Computer Programming Accessible To Everyone
    Drew Olanoff ,  TechCrunch       Drew Olanoff has over 10 years of marketing, PR, customer service and support, relationship buildin...
  • EDGE goals addressed in 2013-14 California State Budget
    California's 2013-14 State Budget and an accompanying trailer bill, AB 86, address key EDGE goals of 1) beginning to restore dedicated f...
  • NCRIC Cyber Internship Program
    Northern California Regional Intelligence Center Cyber Internship Program Northern California Regional Intelligence Center (“NCRIC”) Mission...

Categories

  • Big Data
  • CATV
  • CENIC
  • Certifications
  • Cloud
  • Computational Thinking
  • Computer Engineering
  • Computer Science
  • CTE
  • Database
  • Digital Divide
  • Digital Literacy
  • Digital Media
  • Diversity
  • Educational Technology
  • elearning
  • Electronics
  • Entrepreneur
  • ethics
  • funding opportunity
  • Gaming
  • GIS
  • Grants
  • Hacking
  • Healthcare IT
  • ICT Applications
  • ICT Core Competencies
  • ICT Education
  • ICT Infrastructure
  • ICT Jobs
  • ICT pathways
  • ICT Regulation
  • ICT Research
  • Industry News
  • Innovation
  • Internships
  • James Jones
  • K-12
  • law
  • Linux
  • Mobility
  • MOOC
  • MPICT Announcements
  • Multimedia
  • Networking
  • networking security
  • Olivia Herriford
  • Open Source
  • Operating Systems
  • Pierre Thiry
  • Piracy
  • Public Policy
  • Security
  • Security; Identity Management
  • Smart Grid
  • Social Media
  • Soft Skills
  • Software Assurance
  • Software Engineering
  • Spanish
  • STEM Education
  • Storage
  • Teaching and Learning
  • Telecom
  • Tools
  • virtualization
  • Web
  • WIB
  • Wireless
  • women
  • Women in ICT
  • Workforce Development

Blog Archive

  • ▼  2013 (418)
    • ►  November (41)
    • ▼  October (53)
      • Microsoft creates new cert to make VMware admins '...
      • CSSIA's Train-the-Trainer registration is NOW open!!!
      • CA Career Briefs: Manage Emotions
      • 2013 UC Davis Fall Academy for Integrated Computin...
      • How to Run a Summer Computing Camp - Register by W...
      • Study: U.S. Cities Pay More Money For Less Broadband
      • Protesters Call for an End to NSA Mass Surveillance
      • New top-level web domains announced by Icann
      • MEPs vote to suspend US data sharing
      • 3C Media Solutions Account Available
      • CENIC 2014: Call For Proposals
      • Fon finally launches in the US, inviting consumers...
      • WSJ: Profile of an IT Worker
      • California $19m in SB-1070 CTE Pathways Grants Ava...
      • California AB86: $250m in CTE Grants
      • New CompTIA Certification Addresses Mobile App Dev...
      • China achieves wireless Internet access via lightb...
      • The agriculture business is “a sleeping giant” for...
      • CyberWatch West Free Student 2 Student Webinar Oct...
      • Oakland City Council Passes Open Data Policy
      • GlobalNOC World View
      • New law increases transfer degrees between communi...
      • Ted Talk: James Lyne: Everyday cybercrime -- and ...
      • Large DoS Attacks More Than Quadruple in 2013: Study
      • CA EDGE Campaign: California "Moves Forward" on W...
      • Career Ladders LearningWorks Report Highlights Ben...
      • Free October 30th ICT Sector Workforce Webinar
      • S.F.’s tech community needs to support our schools
      • Code.org December 9-15, 2013 Hour of Code!
      • California governor vetoes state email privacy bill
      • CA Career Cafe: Join a Professional Association
      • Blackhole malware exploit kit suspect arrested
      • Ultrasound chip offers gesture control for mobiles
      • The Anatomy of the IT Industry Workforce
      • Shutdown derails implementation of cybersecurity o...
      • CCCs: Flip Your Classroom Using 3C Media Solutions
      • IT giants back project to slash Internet costs wor...
      • Blu-Ray albums target hi-fi fans
      • Disney develops way to 'feel' touchscreen images
      • Tech Company Makes Massive Grant To SF Middle Schools
      • e-skills uk - GO ON you can do IT
      • Governor signs bills to expand broadband in Califo...
      • MOOCs Could Help 2-Year Colleges and Their Student...
      • Free ICT Workforce Webinar - October 30th
      • For Boston’s techiest academies, even cutting edge...
      • The iPads-in-Schools Challenge: Tools for Consumpt...
      • U.S. Agencies Revamp Standards for Cybersecurity P...
      • San Francisco tech job growth leads nation
      • CompTIA Launches CompTIA Cloud+ to Validate Critic...
      • Cisco NetRiders Competition Registration Period Open
      • The Hour of Code is Coming!
      • CA Career Briefs: Student Persistence
      • CompTIA Mobility+ and Mobile App Security+ Webinars
    • ►  September (44)
    • ►  August (21)
    • ►  July (30)
    • ►  June (28)
    • ►  May (43)
    • ►  April (43)
    • ►  March (35)
    • ►  February (43)
    • ►  January (37)
  • ►  2012 (82)
    • ►  December (25)
    • ►  November (40)
    • ►  October (17)
Powered by Blogger.

About Me

Unknown
View my complete profile