Menu
Menu
DDOS attacks in Australia are shorter but still potent

DDOS attacks in Australia are shorter but still potent

Average length of attack was 22 minutes in Australia compared to 46 minutes across the region

DDOS attacks in Australia are shorter in duration that in other countries but still just as dangerous, according to new data from Arbor Networks.

The average attack length was 22 minutes in Australia compared to 46 minutes across Asia Pacific during the first quarter of 2015. However, the average size attack over the period was 1.25Gbps, twice as big as the average attack in the region.

Arbor said it has documented a dramatic increase in DDOS attack size and activity in the past year. The majority of these attacks use a reflection amplification technique using the network time protocol (NTP), simple service discovery protocol (SSDP), and DNS servers, with large numbers of attacks being detected around the world.

SSDP topped the list of reflection attacks in the first quarter with the largest reported at 26Gbps while the largest NTP reflection attack was 51Gbps.

Reflection amplification is a technique that allows an attacker to magnify the amount of traffic they generate, and obfuscate the original sources of that attack traffic.

This technique relies on two unfortunate realities, Arbor said. Firstly, around half of the service providers do not implement filters at the edge of their network to block traffic with a forged (spoofed) source IP address.

Secondly, there are plenty of poorly configured and poorly protected devices on the Internet providing UDP services that offer an amplification factor between a query sent to them and the response which is generated, Arbor said.

Nick Race, Australia country manager for Arbor Networks said short bursts of DDoS activity required automated defences to protect against them.

“Operators in Australia absolutely should take note,” he said. “On-premise DDoS protection is essential for both detection and mitigation of attacks, enabling bad traffic to be scrubbed in an immediate and automated fashion,” he said.

Read more: BYOD challenge not new, but pervasive: Arbor

Follow CIO Australia on Twitter and Like us on Facebook… Twitter: @CIO_Australia, Facebook: CIO Australia, or take part in the CIO conversation on LinkedIn: CIO Australia

Follow Byron Connolly on Twitter:@ByronConnolly

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the CIO newsletter!

Error: Please check your email address.

Tags DDoS attacksarbor networksddossimple service discovery protocolreflection amplification technique

More about Arbor NetworksFacebook

Show Comments