241 pc increase in avg peak bandwidth in Q2 2014 vs. Q2 2013

Sharath Kumar
New Update

BANGALORE, INDIA: Akamai Technologies, Inc., the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced availability of the Prolexic Q2 2014 Global DDoS Attack Report. Prolexic Technologies, now part of Akamai, is a recognized leader in Distributed Denial of Service (DDoS) protection services, and has produced the quarterly Global DDoS Attack Report since 2011.


The report, which provides analysis and insight into the global DDoS threat landscape, can be downloaded at

"DDoS attacks continue in high numbers and with high average and peak bandwidths. They can take out an entire data center by overwhelming network bandwidth," said Stuart Scholly, senior vice president and general manager of Security at Akamai Technologies. "Behind these powerful attacks are changing tactics to build, deploy and conceal powerful botnets. Server-side botnets are preying on web vulnerabilities and reflection and amplification tactics are allowing attackers to do more with less."

When building server-side botnets, attackers have been targeting Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) vendors with server instances running software with known vulnerabilities, such as versions of the Linux, Apache, MySQL, PHP (LAMP) stack and Microsoft Windows server operating systems. They have also targeted vulnerable versions of common web Content Management Systems (CMS) such as WordPress and Joomla or their plugins.


While the use of server-based botnets is on the rise, the itsoknoproblembro (Brobot) botnet, also based on server infection, lurks in the shadows and appears poised for a strategically targeted comeback. Attacks in Q2 provide indications that the botnet is still in place from its earlier use in the Operation Ababil attacks against financial institutions in 2011-2013. Once thought to have been cleaned up, it appears the botnet has been surreptitiously maintained.

Reflection and amplification attacks were more popular compared to Q2 last year as well as last quarter, representing more than 15 percent of all infrastructure attacks. These attacks take advantage of the functionality of common Internet protocols and misconfigured servers. While the use of NTP reflection attacks was down significantly in Q2, likely due to community cleanup work, SNMP reflector attacks surged in Q2, filling the void.

Highlights from Prolexic's Q2 2014 Global DDoS Attack Report:


Compared to Q2 2013

· 22 percent increase in total DDoS attacks

· 72 percent increase in average attack bandwidth


· 46 percent increase in infrastructure (Layer 3 and 4) attacks

· 54 percent decrease in average attack duration: 38 vs. 17 hours

· 241 percent increase in average peak bandwidth


Compared to Q1 2014

· 0.2 percent decrease in total DDoS attacks

· 14 percent decrease in average attack bandwidth


· 15 percent decrease in application (Layer 7) attacks

· 0.2 percent decrease in average attack duration: 17.38 vs. 17.35 hours

· 36 percent decrease in average peak bandwidth


Analysis and emerging trends

Attacks involving server-side botnets have only been observed in the most sophisticated and carefully orchestrated DDoS campaigns. Their high-volume infrastructure attacks have had signatures that appear to be specially crafted to avoid detection by DDoS mitigation technology. Because of the effectiveness of these attacks, and the widespread availability of vulnerable cloud-based software, they are likely to continue and may be monetized in the underground DDoS marketplace. They pose a significant danger to businesses, governments and other organizations.

These DDoS trends and more are discussed in detail in Prolexic's Q2 2014 Global DDoS Attack Report. A complimentary copy is available as a free PDF download at