2015-16 ddos threat landscape report - incapsula ddos threat... ·...

17
DDoS Threat Landscape Report 2015 - 2016

Upload: dangquynh

Post on 17-Feb-2018

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

DDoS Threat Landscape Report 2015 - 2016

Page 2: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

2

DDoS Threat Landscape Report 2015-2016

Contents

Highlights 3

Preface 3

Overview 4

Network Layer Attack Trends 6

Attack Size 6

Attack duration 7

Attack Complexity 8

Attack Vectors 9

Application Layer Attack Trends 10

Attack Duration 11

Attack Frequency 11

DDoS Bot Capabilities 12

Botnet Activity 13

Top Attacking Countries 13

Top Attacked Countries 14

Botnet malware types 15

About Imperva Incapsula 16

Sources & Definitions 17

Page 3: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

3

DDoS Threat Landscape Report 2015-2016

Highlights

PrefaceDistributed denial of service (DDoS) attacks are amongst the most common cyber threats facing online organizations today. Every week there is news about a prominent business disrupted by an assault. For every big name brand that succumbs to an attack, many smaller ones fall prey to DDoS offenders.

With no signs of abating, understanding the threat is essential for business owners and network and security ops charged with DDoS protection strategy. In this report, we share unique research data collected in the course of mitigating thousands of DDoS assaults against Imperva Incapsula customers.

Leveraging this real-world data, the report profiles the current evolution of DDoS threat landscape—preparing for the threats of today and predicting the challenges of tomorrow.

DDoS attacks increased by 211 percent year over year. This uptrend is fueled by DDoS-for-hire services.

Network layer attacks hit a new high. Largest assault on our record peaks at 470 Gbps.

Offenders experiment with new attack methods in an attempt to circumvent security solutions.

The increase in attacks against UK businesses made it the second-most targeted country.

South Korea dethrones China as the main hub for DDoS botnet activity.

Half of all targeted businesses were attacked more than once.

INTRODUC TION

Page 4: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

4

DDoS Threat Landscape Report 2015-2016

Overview

Overall

Distribution

60%

40%

0%

20%

40%

60%

80%

100%

Q1 2016Q4 2015Q3 2015Q2 2015

63.3% 64.8% 57.7% 58.1%

36.7% 35.2% 42.3% 41.9%

Application Layer Network Layer

Fig. 1 – Distribution of network and application layer DDoS attacks

From April 1, 2015, through March 31, 2016, Imperva Incapsula mitigated an average of 445 attacks targeting its customers per week.

Overall, application layer assaults accounted for the majority (60 percent). However looking closer, their relative number has been trending downward—dropping by more than five percent year over year. If this continues, network layer attacks could be as commonplace as their application layer counterparts by 2018.

Application Layer Network Layer

0

800

600

400

200

Q1 2016 Q4 2015Q3 2015Q2 2015

615

442

635

466

586

319317

183

Fig. 2 – Average number of DDoS attacks per week

NET WORK L AYER AT TACK S

Page 5: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

5

DDoS Threat Landscape Report 2015-2016

As evidenced by the graph in figure 2, the number of both network and application layer attacks doubled during the year. This trend is a result of three factors:

• The continual growth of the Incapsula user base has correspondingly increased the network’s attack surface. (Many new customers onboard our service after receiving threats from DDoS extortionists or in the midst of a DDoS assault.)

• The increased use of DDoS-for-hire services (a.k.a., stressers or booters). These services let anyone launch a short-duration attack—typically an unsophisticated network layer burst of under 30 minutes. The assaults climbed from 63.8 percent in Q2 2015 to 93 percent in Q1 2016, driving the uptrend in overall DDoS activity.

• The use of hit-and-run tactics such as consecutive bursts launched against a target to:

— Exhaust mitigation teams by keeping them on high alert around the clock for weeks.

— Force prolonged activation of on-demand mitigation solutions, often leading to service degradation.

— Create a state of stress and confusion to draw attention away from other malicious activities (e.g., network breach, data extraction).

Whatever the goal, a single hit-and-run event translates into a series of multiple assaults, thereby driving the total number of DDoS attacks upward.

NET WORK L AYER AT TACK S

Page 6: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

6

DDoS Threat Landscape Report 2015-2016

Network Layer Attack Trends

Attack Size

0

100 Gbsp

200 Gbsp

300 Gbsp

400 Gbsp

500 Gbsp

Q2 2016Q1 2016Q4 2015Q3 2015Q2 2015

250 Gbps

176 Gbps

325 Gbps

200 Gbps

470 Gbps

Fig. 3 – Top network layer attack sizes

Attack size (measured in Gbps) is the primary metric used in comparing network layer attacks. It’s also an indicator of the evolution of botnet resources, with which such barrages are executed. During the year, we mitigated many more attacks that exceeded the 200 Gbps mark, making them almost a regular occurrence.

Additionally, the bar was raised in the second quarter as we protected one customer from a 470 Gbps multi-vector attack—the largest we’ve seen to date. Its details provide an interesting case study of just how complex network layer DDoS attacks can be.

Fig. 4 – DDoS attack peaking at 470 Gbps, the largest so far on record

One of the things that the case study shows is how perpetrators have taken to using small payloads (network packets) to achieve high packet forwarding rates, in addition to high throughput capacity.

NET WORK L AYER AT TACK S

Page 7: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

7

DDoS Threat Landscape Report 2015-2016

Such high attack rates present a new type of threat to our customers and Imperva Incapsula has been increasingly fending off such attacks during the year.

Fig. 5 – The face of a new threat – high rate attack peaking at 300 Mpps

In using packet forwarding rates, perpetrators are attempting to exploit a design oversight in current-generation mitigation appliances, the majority of which can’t handle such high Mpps (million packets per second) processing loads. Moving forward, we expect to see an ever-increasing number of such assaults since these appliances are still in their mid-life cycle.

In Q1 2016 we found ourselves mitigating an 80+ Mpps attack every eight days. More than a few exceeded 100 Mpps, with the largest peaking at 300 Mpps (figure 5).

Attack duration

Overall

Distribution

87.8%

7.9%4.3%

0%

20%

40%

60%

80%

100%

Q1 2016Q4 2015Q3 2015Q2 2015

Under 1 hour 1-3 hours Over 3 hours

65% 88% 94% 93%

9%

26%11%

6%1% 7%

Fig. 6 – Network layer attack duration

NET WORK L AYER AT TACK S

Page 8: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

8

DDoS Threat Landscape Report 2015-2016

During the year, we mitigated our share of lengthy assaults with the longest occurring in Q2 2015 and lasting 54 days. However, we saw a decrease in attack duration with a majority of threats involving short bursts of under 30 minutes.

The steep increase in the number of network layer attacks can be traced to the growing popularity of DDoS-for-hire services. These services enable anyone to launch minute-long attacks for as little as $5 per pop.

Additionally, the fact that DDoS-for-hire now accounts for over 90 percent of all assaults paints a new profile of top bad actors. These are non-professionals who use DDoS for racketeering or to instigate attacks out of boredom or spite.

The existence of such unpredictable offenders poses a new threat to many online entities that traditionally didn’t consider themselves a potential target.

Attack Complexity

0%

20%

40%

60%

80%

100%

Q1 2016Q4 2015Q3 2015Q2 2015

13%

5.7%

22%

56.2%

2.1%3.1%

8.4%

3%

25%

61.5%

2.5%

4.8%2.5%

14.6%

75.6%

3.7%

7.9%

3.9%

18.3%

66.1%

Overall

Distribution

66.2%

33.8%

Single vector Multi vector: 2 3 4 5+

Fig. 7 – Network layer attack complexity

The use of multiple payloads in a single attack is a sign of the attack’s complexity. The approach, which uses a mix of different attack vectors, is also a testament to the capabilities of the orchestrator(s) and their choice of tools.

Starting in Q2 2015, we recorded a decrease in multi-vector attacks. Again, this points to increased activity by casual offenders. Interestingly, in Q1 2016, we also saw an increase in the volume of assaults using five or more payloads. This countertrend reminds us that—in parallel with the increased “hobbyist” activity—more capable cybercriminals continue to improve their methods. As per the first rule of the DDoS mitigation industry, attacks continue to get larger and more sophisticated on the high-end of the scale.

NET WORK L AYER AT TACK S

Page 9: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

9

DDoS Threat Landscape Report 2015-2016

Attack Vectors

33.2%

18.6%

44.8%

10.1%

6.4%

0.6%

13.1%

10.9%

5.3%

56.7%

50.7%

21.2%

22.0%

10.4%

12.3%

7.9%

9.5%

8.0%

42.3%

27.3%

28.7%

11.0%

13.6%

1.5%

19.4%

13.6%

6.4%

SSDP amp.

NTP amp.

DNS amp.

DNS flood

ICMP flood

LARGE SYN flood

TCP flood

SYN flood

UDP flood

38.9%

35.4%

20.6%

24.2%

12.8%

2.8%

13.4%

6.3%

6.6%

Q2 2015 Q3 2015 Q4 2015 Q1 2016

Fig. 8 – Network layer attack vectors

Figure 8 shows attack vectors used in network layer assaults over the past year. The lack of a single vector preference suggests a diversification in attack tactics. Perpetrators apparently don’t subscribe to a “silver-bullet” approach.

This reminds us that the high end DDoS perpetrators have moved away from simply trying to take down a target—a feat that doesn’t require diversification or complexity. Instead, the variety in attack vectors reveals that bad actors are expecting to be challenged; they’re trying different methods in an attempt to circumvent mitigation solutions.

NET WORK L AYER AT TACK S

Page 10: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

10

DDoS Threat Landscape Report 2015-2016

Application Layer Attack Trends

Attack Size

Q1 2016Q4 2015Q3 2015Q2 2015

0

60K RPS

120K RPS

180K RPS

240K RPS

300K RPS

179.7 RPS

80K RPS

268.8K RPS

100.8K RPS

Fig. 9 - Top application layer attack sizes

The sheer size of application layer attacks is a secondary factor as most servers can be brought down with just a few hundred requests per second (RPS). Still, over the course of the year, we saw application layer attacks reaching new heights. One soared above 268,000 RPS—the largest we’ve ever recorded. The intent of these massive assaults is to blow a hole in a security perimeter, not just take down a target.

Similar to high-rate network layer assaults (page 5), this is part of the larger trend of DDoS attacks being crafted to bypass mitigation solutions. As part of that trend, we also saw attackers experiment with rare and unique methods. One prominent example is a uniquely executed HTTP flood attack, in which the target was bombarded by abnormally large POST (upload) requests.

Fig. 10 – HTTP flood peaking at record-breaking 8.7 Gbps

APPLICATION L AYER AT TACK S

Page 11: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

11

DDoS Threat Landscape Report 2015-2016

Figure 10 shows that at a rate of 163,000 RPS, the attackers were able to generate 8.7 Gbps of DDoS traffic. This is unheard of in relation to application layer assaults, which rarely exceed 0.5 Gbps. This attack, exploiting nuanced soft spot of a hybrid DDoS mitigation setups, highlights the degree of understanding some perpetrators now have about the inner workings of anti-DDoS solutions.

Attack Duration

0%

20%

40%

60%

80%

100%

Overall

Distribution

56.9%

26.8%

16.3%

Q1 2016Q4 2015Q3 2015Q2 2015

Under 1 hour 1-3 hours Over 3 hours

52%

23%

25%

52%

20%

28%

58%

23%

19%

51%

26%

23%

Fig. 11 – Application layer attack duration

Compared to network layer assaults, application layer attacks are significantly easier to sustain because they require far fewer botnet resources. As a result, more than 44 percent of application layer attacks lasted more than one hour as compared to just 12.2 percent of network layer attacks.

In Q3 2015, we saw a trend develop regarding an increase in application layer assaults lasting between one and three hours.

Attack Frequency

Single attack 2-5 attacks More than 5 attacks

0%

20%

40%

60%

80%

100%

Q1 2016Q4 2015Q3 2015Q2 2015

53%

30%

17%

71%

19%

10%

55%

27%

18%

50%

32%

18%

Overall

Distribution

57.3%

26.7%

16%

Fig 12 - Application layer attack frequency

APPLICATION L AYER AT TACK S

Page 12: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

12

DDoS Threat Landscape Report 2015-2016

Unlike network layer assaults, which often target the Incapsula network, every application layer attack can be linked to its specific target. This enables us to measure the frequency by which any given organization is repeatedly hit by DDoS assaults.

On average, our data shows that more than 40 percent of targets are attacked more than once with 16 percent targeted more than five times. Looking at quarter-by-quarter data, one can also observe an uptrend in repeat attack events. These have increased from 29.4 percent in Q3 2015 to 49.9 percent in Q1 2016.

This ties into the increased use of hit-and-run tactics (page 4)—yet another reminder that DDoS is a long-term security issue. Once sighted by tenacious offenders, even protected businesses are likely to be persistently hit, as perpetrators seem unfazed by multiple failed attempts.

DDoS Bot Capabilities

Primitive Only Cookies JS and Cookies

0%

20%

40%

60%

80%

100%

Q1 2016Q4 2015Q3 2015Q2 2015

Overall

Distribution

76%

18%

6%

24.9%

74%

25.2%

73.6% 96.6%

17.8%

18.9%

63.3%

1.2%1.1% 0.7%

2.7%

Fig. 13 – DDoS bot capabilities

Application layer attacks use bad bots to make numerous TCP connections with a server in an attempt to exhaust its resources. Bots of this type use fabricated user-agent HTTP headers—most commonly those of popular web browsers—to mask their true identity.

To complete the charade, more advanced bots also exhibit browser-like traits including being able to retain cookies and parse JavaScript. These bots can circumvent bare bones security solutions that test solely for such criteria when trying to identify fake/malicious visitors.

Bad bot advancements hint at an evolution in application layer attack tools. On average, our records show that 24 percent of DDoS bots were so called advanced attackers—able to bypass at least some of these rudimentary security tests. In Q1 2016, the number of advanced attackers rose to a record high of 36.6 percent.

APPLICATION L AYER AT TACK S

Page 13: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

13

DDoS Threat Landscape Report 2015-2016

Botnet Activity

Top Attacking Countries

14.9%

13.8%9.7%

2.7%

37.5%

6.2%9.1%

9.4%

39.8%

5.8%11.7%

12.6%

6.2%

7.6%5.7%

29.5%

CHINA

VIETNAMUSA

S. KOREA

Q2 2015 Q3 2015 Q4 2015 Q1 2016

Fig. 14 – Top attacking countries

We track botnets used to launch assaults against Incapsula-protected networks, web applications and cloud environments as part of our ongoing security research. Amongst other things, this enables us to keep a record of repeat offenders so as to improve the accuracy of our traffic- scrubbing solutions. On a higher level, information provides a view of macro trends in DDoS botnet activity including common countries of origin. As in our previous reports, China remains the leader on the list as the main point of origin for botnet activity in three out of the four quarters.

More intriguing, however, is the steep increase in botnet traffic emanating from South Korea. By Q1 2016, it had become the point of origin for almost one-third of all application layer DDoS traffic. Although this situation is new, it’s not surprising given that country’s powerful Internet infrastructure.

South Korea’s high-speed Internet backbone enables botnet shepherds to increase compromised device output. However, its window of opportunity might be short-lived as the country mobilizes more resources for its cyber security investment.

The most recent example of that effort is its K-ICT 2020 initiative—a five-year plan to turn South Korea into a global cyber security power. This effort will nearly triple that government’s investment and create 19,000 new jobs. It also allows the country to buff its resilience against the spread of malware in the corporate and civilian sectors where botnet operators do most of their “recruiting.”

BOTNET AC TIVIT Y

Page 14: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

14

DDoS Threat Landscape Report 2015-2016

Top Attacked Countries

47.6% 23.2%

6.8% 8.6%

45.9% 2.5%

1.8% 1.2% 1.2%

2.5%

50.3% 9.2%

2.9% 6.7% 3.1%

USA UK

NETHERLANDS JAPAN GERMANY

Q3 2015 Q4 2015 Q1 2016

Fig. 15 - Top attacked countries

Even as points of origin for botnet activity have shifted, geographical targets have essentially remained the same during the past year, which is to be expected. With the goal of using DDoS for extortion or attention-grabbing vandalism, most perpetrators target successful online businesses more often than highly developed industrial countries.

Deserving a special mention, one trend result is the increase in DDoS attacks on UK-based businesses during the final six months of this study. This number first spiked in Q4 2015 during a holiday season when increased cyber extortion attempts caused a boom in criminal activity.

In Q1 2016, attacks on the UK trended downward, yet still accounted for 9.2 percent of all assaults making the UK the second-most attacked country for two succeeding quarters.

While the majority of attacks in the UK targeted small and medium sized organizations, this trend also translated into several high-profile assaults, including the takedowns of the BBC, HSBC UK and the Irish National Lottery.

BOTNET AC TIVIT Y

Page 15: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

15

DDoS Threat Landscape Report 2015-2016

Botnet malware types

DirtJumper

Cyclone

PCRat

Nitol

MrBlack

26.4%

18.4%

17.7%

12.1%

5.1%

16.3%

14.8%

11.4%

9.6%

0.1%

0.6%

33.3%

32.8%

4.1%

5.3%

0.0%

44.4%

14.6%

7.5%

2.8%

Q2 2015 Q3 2015 Q4 2015 Q1 2016

Fig. 16 - Most common botnet malware types

During the study period, the majority of attacks came from botnets running variants of Nitol, Cycloe and PC Rat malware. On average, these attacks accounted for 55.1 percent of all botnet activity.

In Q2 and Q3 of 2015, we also monitored numerous attacks from (mostly) SOHO routers infected with MrBlack malware which we documented in detail. Attackers also used Sentry MBA, a password cracking tool which can be used in a DDoS attack when run at a high rate.

Finally, in Q1 2016 we saw an activity spike from botnets running Generic!BT variants, originating mostly in Russia and Ukraine. Overall they accounted for 12.8 percent of botnet activity in that quarter.

BOTNET AC TIVIT Y

Page 16: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

16

DDoS Threat Landscape Report 2015-2016 ABOUT INCAPSUL A

What’s next• Read our DDoS Impact Report to learn more

about the business effects of DDoS attacks.

• Use our DDoS Response Playbook to create your DDoS response plan.

• Visit www.Incapsula.com for addition information about Incapsula DDoS protection services.

Questions?

Incapsula DDoS Protection: • Global cloud network with over 2 Tbps capacity

easily handles even the largest attacks

• Advanced scrubbing algorithms mitigate complex attacks without challenging legitimate users

• Protect DNS, network devices and Web servers• Supports Anycast DNS and Unicast DNS routing

• Supports on-demand BGP routing • Monitors attacks in real time

• Supported by 24/7 operations center

• Backed by the Imperva security research team

• Part of a comprehensive solution that includes web security, high availability and content delivery

About Imperva Incapsula Imperva Incapsula is a cloud-based application delivery service that protects websites and increases their performance, improving end user experiences and safeguarding web applications and their data from attack.

Unlike the competition, Incapsula uses proprietary technologies in its solutions. Our client classification technology identifies bad bots, and our big data analysis of security events increases accuracy without creating false positives.

Incapsula services include:

• A web application firewall (WAF) to thwart hacking attempts

• DDoS mitigation to ensure attacks don’t impact online business assets

• A content delivery network (CDN) to optimize load speed and user experience

• A cloud-based load balancer to enable flexible scalability

Only Incapsula provides enterprise-grade website security and performance—without the need for hardware, software, or specialized expertise.

ApplicationDelivery

WEBSITESECURITY

DDOSPROTECTION

LOADBALANCER

CONTENT DELIVERYNETWORK

CONTACT US

Page 17: 2015-16 DDoS Threat Landscape Report - Incapsula DDoS Threat... · p!!"#$%&'()*$+),-./)0($1(0"'*$ 234562347 $vh ylghqfhge \w khj udskl q¿ jxuh w khq xpehur ie rwkq hwzrund qgd ssolfdwlrqo

17

incapsula.com

© 2016, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula, Skyfence, CounterBreach and ThreatRadar are trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or registered trademarks of their respective holders.

DDoS Threat Landscape Report 2015-2016

SourcesThe above analysis is based on data from the following Imperva reports:

• Q2 2015 Global DDoS Threat Landscape Report – Jun 9, 2015

• Q3 2015 Global DDoS Threat Landscape Report – Nov 2, 2015

• Q4 2015 Global DDoS Threat Landscape Report – Jan 28, 2016

• Q1 2016 Global DDoS Threat Landscape Report – Apr 20, 2016

These represent a combined record of 12,092 network layer and 18,444 application layer DDoS attacks on websites, networks and cloud environments protected by Imperva Incapsula services.

Definitions DDoS attack – Defined as a persistent, distributed denial of service event against the same target (e.g., IP address or domain). It’s usually preceded by a quiet (attack-free) period of at least ten minutes, and followed by another quiet period of the same duration or longer.

Network layer attack – An assault occurring against either the network or transport layers (OSI layers 3 and 4). Its goal is to cause network saturation by expending much of the available bandwidth. The impact of network layer assaults is measured in bits per second (bps), tested against total network capacity. The impact is also measured in packets per second (pps), tested against the processing capacity of the networking devices (e.g., switches or routers).

Application layer attack – An assault occurring on OSI layer 7. Its goal is to bring down a server by exhausting its processing resources (e.g., CPU or RAM) with a high number of requests. It’s measured in requests per second (rps), tested against the maximum number of requests that can be handled by a server(s). Such attacks are executed by DDoS bots able to establish a TCP handshake to interact with a targeted application.

Botnet – A cluster of compromised, malware-infected devices remotely controlled by an offender. Device owners are unaware of their system participation.

DDoS bot – A malicious software application used by a perpetrator. So-called bad bots only come into play in application layer attacks, where a TCP connection is established. They typically masquerade as browsers (human visitors) or legitimate bots (e.g., search engine crawlers) to bypass security solutions.

Payload – In the context of this study, a payload is a packet type used in a network layer attack. It’s fabricated by an attack script and can often be altered on-the-fly. In many cases, multiple payload types are used simultaneously during the course of a single attack.