Hitting High Bandwidth on DDoS Attacks

Hitting High bandwidth on DDoS Attacks

Bandwidth and the number of critical communications service providers targeted by rolling distributed denial of service (DDoS) attacks.
Network bandwidth is a measure that indicates the maximum capacity of a wireless or wireless network to transmit data over a network connection at a given time. Typically, bandwidth is represented in the number of bits, kilometers, megabits, or gigabits sent in 1 second. Similar to volume, bandwidth defines the rate of data transfer. Bandwidth is not a measure of network speed – a common misconception.

With DDoS, cybercriminals infiltrate a network with so much malicious traffic that it cannot function or communicate normally. Regular traffic has stopped.

Bandwidth released the following statement on Wednesday about the DDoS attack:

“Bandwidth groups are currently investigating an incident involving incoming and outgoing calls at this time. Customers may experience temporary phone failures or voice quality problems, and one-way audio conditions. All parties have participated.”

David Morken is the founder of Bandwidth, chairman, and CEO. In a blog post to clients and colleagues, he said, “While we have done a lot of damage, we know that some of you have been very affected by this event.”

The number of denial-of-service distribution (DDoS) attacks has quadrupled in the first half of 2021, with the frequency of seizures, new data displays.

The security company Imperva withdrew its intelligence from the 5,600 network attacks its customers encountered to find that the attackers continued to increase the intensity of the attack as they reduced the attack time. More than half of the attacks lasted eight minutes or less, with attackers repeatedly attacking the same companies with data floods – including a single episode of more than 1 Tbps, according to Imperva.

Companies have a hard time responding to such attacks in the most immediate way, says David Elmaleh, chief product manager of services on the outskirts of Imperva.

“There is a natural imbalance between the infrastructure that attackers can use and the infrastructure capacity of those targeted to cope with the growing number of vehicles,” he said. “There is a gap between business communication and the attacker’s power, which means that no organization can rely on its current infrastructure – even if it can handle a large number of gigabytes per second.”
While high attack bandwidth and packet levels did not set records – Google saw significant attacks last year – Imperva data shows both are rising rapidly. Increased volume and cadence attacks are possible because the attackers have too many tools at their disposal, and the epidemic has left companies with an extensive list of services to be targeted, he said.

The price of a cup of coffee could hamper access to corporate cloud services, while $ 100 could slow down the network for hours, if not days, Imperva said in a statement.

The changes recorded by Imperva can be explained by the defenders who mature their skills and block the attack immediately. However, attackers can see short, high-bandwidth attacks as the best way to create disruption, Elmaleh said. Short-term attacks – called pulse or pulse-wave attacks – allow attackers to resolve existing solutions and shut down the application. This makes mitigation very difficult, especially if the attackers are attacking the same thing again, he says.

“Short attacks are deliberately designed to challenge the DDoS protection of the target, monitor its response, and define an attack strategy that will weaken it,” he said. “This approach is very effective and efficient in solving DDoS solutions for huge clouds, causing damage before cloud depletion can begin.”

Imperva researchers also recognized other styles. In addition to the large volumes, the attackers also returned to sending traffic using the Transmission Control Protocol (TCP), which could seem legitimate and make the attack difficult to detect at first. Communication protocol after most Web traffic, TCP requires a sender and traffic receiver to perform a communication session through a process known as a handshake. TCP traffic has increased to 32%, up from 10% by 2020, the report shows.

However, the most common type of attack traffic remains the User Datagram Protocol (UDP), which accounts for 43% of all attack traffic and is commonly used to send domain names (DNS) and video streaming services. The third most frequently used traffic attack on SYN packets, accounting for 21%.

The company also recorded a significant part of the computer and IT sector, which was hit by 29 percent. The business and financial industries came in second and third place, with 25% and 22% attacks, respectively.

Bad Bots Mos

The automatic DoS attack is not the only threat. Automated bots – from search bots and data-scraping to endangered scanners – make up about two-thirds of the traffic to websites in the first half of 2021, according to a report published by security company Barracuda Networks. Only 36% of the average daily traffic to a website is made up of requests from people.

While DDoS attacks often make a site or service unusable, horrible bot traffic often performs unwanted tasks, such as trying to access a site using a large number of data or scratching price data on e-commerce sites, the company said.

“These advanced bots are trying their best to escape the common defenses and try to carry out their vicious activities under the radar,” Barracuda researchers said in a report. “In our database, the most common of these persistent bots are those that follow e-commerce applications and login sites.”

Barracuda and Imperva data differ significantly from the default traffic level, suggesting that the number of default traffic is likely to exceed the first half of 2021 or that companies have different user bases. An earlier Imperva report found that bots – both “good” and “bad” – only accounted for 41% of traffic by 2020, compared to Barracuda’s gain of 64% of bot traffic in the first half of 2021.


related articles

Our blog offers a wide range of informative and insightful articles on various topics, including technology, cybersecurity, DDoS and current events. Our expert writers cover the latest trends and provide valuable insights and tips on a variety of subjects, aimed at educating and entertaining our readers.

post a comment

Post a Comment is a feature on our blog that allows readers to share their thoughts and opinions on our articles. It provides a platform for open discussion and encourages engagement and interaction between our readers and writers. We welcome constructive feedback and encourage readers to share their insights and experiences on the topics we cover.

Leave a Reply

Your email address will not be published. Required fields are marked *