A comprehensive study on distributed denial of service (DDoS) attacks in Asia - from Prolexic/Akamai, the world’s largest and most trusted DDoS mitigation service provider. Get data and insights into the Asian security landscape, including the most common types of DDoS attacks, industries and protocols targeted, and attack origins. Case studies on the now infamous Shellshock attack and other notable botnets include analysis of attack patterns, PCAP samples, and successful mitigation strategies.
For more information, visit: www.akamai.com
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
Shellshock and more: Case studies on DDoS attacks and mitigation strategies in Asia Pacific & Japan (APJ)
1. Shellshock and more: Case studies on DDoS attacks and
mitigation strategies in Asia Pacific & Japan (APJ)
Ashvini Singhal, Security Practice Manager
Clark Shishido, Security Researcher (CSIRT)
On average, DDoS attacks lasted 17 hours
Eighty-nine percent of Q2 2014 DDoS attacks targeted the infrastructure layer; the remaining 11 percent were application attacks
The most common infrastructure attacks included SYN floods (26 percent of all attacks mitigated in Q2), UDP floods (25 percent), NTP (7.4 percent) and ICMP (6.6 percent)
The most common application-layer attacks were HTTP GET floods (7.5 percent of all attacks mitigated in Q2), HTTP POST floods (2.3 percent), PUSH floods (0.8 percent) and HEAD floods (0.2 percent)
The most common reflection attacks vectors included NTP (7.35 percent), CHARGEN (4.54 percent) DNS (4.00 percent) and SNMP (3.03 percent)
Nearly half (46 percent) of all DDoS attacks targeted the Gaming industry
The top three country sources for DDoS attacks this quarter were United States, Japan and China