"The first half 2019 DDoS attacks Situation Report" Published: application-layer attacks situation is still grim, massive mobile device into a new generation of broilers

The first half of 2019, Ali cloud security team to help protect users from a daily average of more than 2,500 DDoS attacks, and 2018 unchanged. Ali cloud currently carries 40% of the site traffic China to provide basic security and defense for the millions of customers worldwide. It can be said, DDoS attack and defense posture on Ali cloud is a microcosm of the entire Chinese offensive and defensive posture. Ali cloud-based DDoS attack data security team on the 2019 first half of the cloud, from DDoS attacks, botnets control, multiple dimensions DDoS broiler, attacks and other circumstances do statistical analysis, hoping to provide a reference for government and enterprise customers.

The report found that:

1. Tb class attack time has come. The first half of 2019 has been a sustained attack nearly two months Tb-level, high-volume attacks based on TCP type of attack, attack a single network segment traffic continues to flow and large, has been monitoring traffic into a single C segment nearly 200G.

2. Memcached reflective amplification attacks reached a peak in the number of attacks in January, subsequent 2 - June reflected enlarge the number of attacks continued to show a downward trend, thanks to the governance bodies of Memcached reflection sources, the current overall downward trend stabilized.

3. The application layer attacks confrontation. Attackers feature to increase the amount of attack, defense attempts to circumvent the rules, overwhelmed by the changes in the performance of a variety of protective equipment. For one million connected depletion-mode attacks, companies need to quickly isolate protection according to the amount of attack, attack and rapid expansion based on the amount of protection dynamic, not a single node performance bottlenecks become defensive.

4. disguised as a normal application malicious mass APP has allowed a new generation of mobile devices broiler. An attacker can attack easily achieved without triggering the speed limit defense strategy, so that the speed limit and the blacklist was "a key to stop the bleeding," the Defense Style failure in the PC era broiler. For individual users, do not install the APP from the unaudited non-formal channels, so that my phone became smudge tool production.

For a complete version of the report, please click on the link to download: https://files.alicdn.com/tpsservice/02c8f14880966afed6f44273f78eb261.pdf?.pdf

Guess you like

Origin yq.aliyun.com/articles/709148