Average DDoS Attack Volumes Have Trebled in Past Year
Link11, a leader in cloud-based anti-DDoS protection, has released DDoS statistics for Q4 2018, revealing that the volume and complexity of attacks continued to grow in Europe during the final quarter of 2018. While Link11’s Security Operations Center (LSOC) registered 13,910 attacks in Q4 (12.7% down compared to Q3), the average attack volume grew by 8.7% to 5Gbps, and 59% of attacks used multiple attack vectors.
Key findings of Link11’s Q4 DDoS report include:
Average attack volumes grew by 194% in 12 months: in Q4 2018, average attack volumes were 5Gbps, nearly treble the 1.7Gbps average seen in Q4 2017. Attackers are using increasingly powerful botnets comprising misused cloud servers, hijacked IoT devices and embedded devices.
Hyper-scale attacks hitting hard: in Q4, the LSOC registered 13 attacks with volumes over 80Gbps. The biggest attack reached 173.5 Gbps – well over double the volume of the biggest attack seen in Q4 2017, which hit 70.1 Gbps.
More complex multi-vector attacks: the majority (59%) of attacks in Q4 2018 were multi-vector attacks, compared with 45% in Q4 2017. The most complex attacks seen in Q4 used up to nine different attack vectors. The three most commonly used reflection amplification vectors were CLDAP, DNS reflection and SSDP.
The LSOC also observed that attacks occurred most frequently on Saturdays and Sundays, with the level of attacks declining during the business week. Attackers targeted organizations most frequently between 4 pm and midnight Central European Time, with attack volumes at their lowest between 6 am and 10 am CET.
"The increase in the impact and complexity of attacks continues unabated," said Marc Wilczek, COO of Link11. "When faced with DDoS bandwidths well over 100 Gbps and multi-vector attacks, traditional IT security mechanisms are easily overwhelmed, and unprotected companies risk serious business disruption, loss of revenue and even fines. To stop these attacks disrupting business operations, organizations need proactive protection that tracks and responds to evolving attack scenarios and patterns automatically, using advanced machine-learning techniques.”
Industry: Cyber Security News
- Outside IR 35 CONTRACT SC CLEARED Cyber Security Operations Analyst SPLUNK ES- UK REMOTE- £500 a day.
6 month contract Outside IR35 Operational Cyber Security Analyst. Hands on Splunk Security Enterprise and Security clearance is required As is someone that holds SC clearance. SOC and Vulnerability management experience. Vulnerability Analysis / Management - Tenable
- SailPoint Consultant
- Upto €80,000
SailPoint Consultant is need for this rapidly expanding global business, The business is currently in the middle of a SailPoint Deployment, they require an experienced Consultant who is able to help them on this Journey You will be responsible for helping to configure and deploy SailPoint as well as on board applications onto the platform You will also work with the business to understand workflow and process to help align the way the business works to ensure that the business gets the most from the deployment We are looking for an experienced SailPoint consultant who has experience with both Deployment and BAU work and is interested in joining a business which is at the start of an interesting IAM Journey
- SOC Manager Security Operations. SIEM, Threat / Vulnerability, IR, SOC Service- Exclusive
- United Kingdom
SOC Manager- SIEM, Threat / Vulnerability, Incident response. Exclusive Project. Management and on growth growth of Security Operations Centre capability. Managing and maturing the team, technical services line and fronting client engagements where needed. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; evolving the technical process, building operational capability, managing and hiring team, involved at a high level overviewing policy/playbooks, fine turning of the go-to-market collateral etc.
- Contact 12 month- Security Operations- Tanium Engineer / Analyst.
- United Kingdom
- Dependent on experience
Security Operations engineer / Analyst with Tanium for a 12 month contract. Experience configuring using, managing, supporting troubleshooting Tanium's suite of end point solutions is essential. The opportunity is due to a client expanding its international capability to a follow the sun model. To be involved in spinning up a European capability. Based in the UK. English essential and ideally being fluent in French.