Blog|Login|中文Deutsche日本語
October 01, 2013
 Trend Watch – DDoS: “We Need a Bigger Boat”
Pin It

IStock_000003953967XSmallIt’s no news that DDoS attacks are growing in frequency and scale. Earlier this year Spamhouse suffered from what security experts have cited as “the largest DDoS attack ever,” peaking at 300+ Gbps. The story recently resurfaced when the attacker was apprehended.

This morning, eWeek reported on a new attack, which will go down as one of the largest DDoS attacks of the year. While the identity of the target remains undisclosed, the attack details are available. This latest DDoS attack started on Sep 24th, lasted for nine hours, and peaked at 100 Gbps.

As reported in the eWeek article, the attacked organization was protected by the Imperva Incapsula DDoS attack mitigation service, and therefore did not suffer service disruption.

One of the lessons that an attack this big teaches us is that attackers are generating a high magnitude of traffic to take down a target. Most companies, even some carriers, don’t own the bandwidth to continue service through such an attack. And attacks are ever growing – one 50 times larger can be right around the corner. DDoS protection companies provide the extra bandwidth when you are under attack – so you have a bigger boat to absorb the load.

Indeed. We build bigger boats.

 

Where can I learn more?

  • Our HII Research Paper on DDoS
  • The Imperva Incapsula DDoS attack mitigation service

 



Comments

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...

Post a comment

Comments are moderated, and will not appear until the author has approved them.

« Lost and Found in the Dark | Main | Score sheet: Testing Some XSS Evasion Techniques Against Our WAF »

Find Us Online
RSS Feed - Subscribe Twitter Facebook iTunes LinkedIn YouTube
Authors
Monthly Archives
Email Subscription
Sign up here to receive our blog: