Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Corero’s Annual DDoS Research Highlights Attacker Behaviour During Pandemic as Staff Embrace Home Working

  • 400% Increase in OpenVPN Attacks and 86% Rise in Short Duration Floods While the Risk of a Repeat Attack Within a Week Grows by Two Thirds

Corero Network Security, a leading provider of real-time, high-performance, automatic Distributed Denial of Service (DDoS) cyber defense solutions has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the latest trends, observations, predictions, and recommendations based on DDoS attacks against Corero customers during 2020.

The report, now in its 6th year, highlights that DDoS threats are growing in sophistication, size, and frequency. Yet 2020, also reveals changes in attacker behaviour during the pandemic including a year-over-year increase of nearly 400% in the use of OpenVPN reflections as an attack vector.

Recommended AI News: Accenture and Shiseido Establish Joint Venture to Accelerate Shiseido’s Digital Transformation

As the report co-author Ashley Stephenson for Corero explains, “OpenVPN as a reflection DDoS vector is bad news for the victim being attacked but, also for the organisation whose OpenVPN infrastructure is being used to launch the attack as their remote workers will suffer from a degraded, or possibly unusable, service, impacting productivity and, potentially, business continuity.”

Related Posts
1 of 40,561

The report also finds a 70% growth in DDoS attacks over 10Gbps as high packet rate attacks grew overall during 2020, compared to slight declines in 2019. The report suggests it is due to the increasing shift to 100Gbps Internet connectivity and is accompanied by a trend indicating more everyday DDoS  larger than for 10G. Frequency of repeat attacks also grew with a 68% increase of organisations experiencing a second attack within a week.

However, the report does have some constructive recommendations regarding DDoS defense. “With a 2020 estimate that 99% of observed attacks are coming in below link saturation there is a real opportunity to detect and block many DDoS attacks in real time without requiring expensive and time-consuming traffic redirection to cloud solutions,” says Ashley, “This means that most attacks can be addressed by on-premises solutions without the disruption, risk or cost of re-routing customer traffic across the Internet to third party scrubbing centers.”

Recommended AI News: Unisys Named a Leader in Cognitive and Self-Healing IT Infrastructure Services by NelsonHall

Looking towards 2021 and Ashley believes that the data from the report shows that DDoS attacks and threats are not going away anytime soon, “Once again we are reporting a net increase in the number of unique DDoS attack vectors seen in the wild and in the level of year-over-year DDoS activity,” he says, “The specific example of the mid-year FBI alert regarding the malicious use of built-in network protocols for DDoS attacks demonstrates that development of new vectors is inevitable. Yet our data shows that these exploits were already being used in attacks before the FBI alert and their use continues to grow to this day. Prevention is an impractical strategy, detection and mitigation continue to be the only defense.”

As the trend towards short duration, high intensity attacks using multiple vectors continues, Ashley advises that “…as organisations plan their strategy for effective DDoS protection, the relationship between time-to-mitigation and potential downtime is a vital consideration.  Organisations must consider that the typical time to swing traffic to cloud DDoS protection means the attack is often already over and the damage may be done.”

Recommended AI News: OpenText Launches Managed Detection and Response (MDR) Service

Comments are closed.