Maximum operational threat: Service layer and security layer attacks will replace botnet attacks

Maximum operational threat: Service layer and security layer attacks will replace botnet attacks

Arbor Networks, Inc., a top provider of security and network management solutions, reports that botnet distributed denial of service (DDoS) attacks against services and applications are the top operational security issues facing service providers .

Arbor's fifth annual Global Internet Infrastructure Security Annual Report interviewed 132 primary, secondary and other IP network operators in North America, South America, Europe, Africa and Asia. Last year, 66 service providers were surveyed. This year's service providers surveyed were twice that of last year, and the distribution areas and organizational forms were also more diverse. This year's survey aims to provide useful information to help network operators make more informed decisions on the adoption of network security technologies to protect critical Internet services and other IP infrastructure.

Attack shifted to cloud computing

About 35% of the respondents believe that in the next 12 months, more sophisticated and sophisticated service-layer and application-layer attacks will replace large-scale botnet attacks and become the largest operational threat. 21% of the respondents were the biggest threat, ranking second. This year, more than half of the vendors surveyed pointed to an increase in service-layer attacks on the order of gigabit bandwidth. Such attacks are also based on botnets and are specifically used to find weak links in services, such as high-cost, vulnerable back-end queries and computing resource limitations.

Ken Silva, Chief Technology Officer of VeriSign, said: "Our users face a series of threats in the field of cloud computing and data center security, and also face more and more challenges in DNS security and IPv6. Arbor Global Internet Infrastructure Security Annual Report is Internet Security And the operations industry provide a unique perspective on the issues that the industry must solve. "

Some interviewees pointed out that due to application layer attacks last year, some well-known Internet services caused long-term (hours) interruptions. The targets of service layer attacks include distributed domain name system (DNS) infrastructure, load balancing, and large-scale SQL server background infrastructure.

The scale of the attack is still expanding, but the growth rate is slowing down

In the previous annual Global Infrastructure Security Annual Report, service providers pointed out that the peak rate of distributed denial of service (DDoS) attacks has nearly doubled year-on-year, and the peak rate of attacks has increased from 400 Mbps in 2001 to more than 40 Gbps. This year, the supplier pointed out that the sustained attack peak rate is 49 Gbps, a 22% increase from last year ’s 40 Gbps peak rate, indicating that the growth rate of the attack scale has slowed in the past 12 months. In comparison, the attack rate of 40 Gbps last year was 67% higher than the maximum attack rate surveyed in 2007.

In addition, only 19% of survey respondents pointed out that the largest attack occurred this year was in the range of 1-4 Gbps, compared with about 30% of respondents who held the same view in 2008.

Internet architecture and operations face a perfect storm dilemma

The Internet architecture and operations industry faces a convergence of issues, including the increasingly prominent issue of IPv4 address exhaustion, and preparations for migration to IPv6, DNS security extensions (DNS SEC), and 4-byte ASN (for Internet interdomain routing) jobs. Any of these changes will pose great architectural and operational challenges to network operators; given the growing importance of the Internet for global communications and commerce, these changes will become the largest and most potentially destructive factor in the history of Internet development .

The Internet is not ready for IPv6 implementation

Most of the interviewees are very concerned about the security significance of IPv6 and the slow migration from IPv4 to IPv6 (or at least the parallel deployment of IPv6). Similar to the previous year ’s survey, vendors complained about the lack of IPv6 security features in routers, firewalls, and other critical network infrastructure. Some vendors worry that the lack of IPv6 testing and deployment experience may lead to major Internet security vulnerabilities.

Arbor's latest survey shows that IPv6 traffic accounts for 0.03% of total Internet traffic, compared to 0.002% in the previous year. Although there has been a significant increase, IPv6 still accounts for a small portion of the current total Internet traffic.

About Arbor Networks

Arbor Networks is a leading provider of global network security and management solutions for operators and enterprises. Users include more than 70% of ISPs in the world and many large enterprise networks. Arbor's security service control solution provides customers with a unified way to view network performance, helping customers quickly detect abnormal behavior, resist threats and enforce rules. This applicable business intelligence can create new forms of revenue for customers and remain competitive.

Arbor also operates the ATLAS global cyber threat analysis platform-a special collaborative project where more than one hundred service providers worldwide share real-time information on security, traffic and routing. No other organization has gathered real-time information about the status of the Internet, and at the same time has developed a cross-vendor collaboration method that helps many business decisions.

For in-depth technical information about the latest security threats and Internet traffic trends, please visit the ASERT blog.

Budget Business Laptop

This is the most competitive 15.6 inch Budget Business Laptop, comes with 2022 intel latest celeron cpu-N5095, J4125, etc . Of course, other Budget Working Laptop are also available.

For example, 15.6 inch i5 4th Budget Workstation Laptop for your mid-level task, 14 inch i5 10th Budget Laptop For 3d Modeling, 15.6 inch i7 5th Budget Laptop For Photoshop, or 15.6 inch i7 10th budget laptop for work, etc. Of course, there are other type device, like Android Tablet, 2 In 1 Laptop , Mini PC , All In One PC.

A thin, portable, light-performance laptop may be the ideal tool when people choose a business laptop, therefore just ask yourself 1.what jobs you mainly need this device to do, then choose the cpu and storage necessary, 2.if need fingerprint or backlight; 3. prefer type C charging? Or traditional DC is ok? 4. Does RJ45 webcam is important for you? 5. how many hours you need the laptop to work when do your main jobs?

6.Camera position, prefer on the middle of screen up? or is ok on the bottom of screen?


Budget Business Laptop,Budget Working Laptop,Budget Workstation Laptop,Budget Laptop For 3d Modeling,Budget Laptop For Photoshop

Henan Shuyi Electronics Co., Ltd. , https://www.shuyiaiopc.com