Reports on DDoS attack trends including origins, tactics, types, targets, and hot-topic cybersecurity issues

Quarterly Security Reports

Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Each issue includes quarter-over-quarter and year-over-year trends, plus a spotlight on a recent DDoS attack and a case study on a hot-topic issue in cybersecurity.

  • Q1 2015 State of the Internet – Security Report

    DDoS attacks get smaller, but double in frequency and increase duration > 40 percent in duration
    Millions of web application attack triggers analyzed with a breakdown of seven common vectors
    Spotlight: 100+ Gbps mega attacks
    Case study: Security implications for IPv6
    Analysis: Malicious intentions behind real-world SQL injection attacks
    Emerging threat: Website defacements and domain hijacking

  • Q4 2014 State of the Internet – Security Report

    Enterprises with an online presence must anticipate DDoS attacks
    Number of DDoS attacks nearly doubles in a year
    Spotlight: A multiple TCP flag DDoS attack (XMAS-DDoS)
    Malware: Evolution from cross-platform to destruction
    Botnet profiling technique for web application attacks
    Performance mitigation: Bots, spiders and scrapers

  • Q3 2014 State of the Internet – Security Report

    Thriving criminal industry taps into Internet devices, spreads easy-to-use tools
    Four-fold increase in DDoS attack size and volume
    Spotlight: 321 Gbps DDoS attack
    Case study: DDoS botnets built from devices other than PCs and servers
    Emerging threat: Phishing attacks target third-party content providers

  • Q2 2014 Global DDoS Attack Report

    Malicious actors switch tactics to build, deploy and conceal powerful botnets
    Attack activity remains elevated
    Spotlight: A powerful botnet –powered DNS attack
    Case study: Botnet construction based on web vulnerabilities

  • Q1 2014 Global DDoS Attack Report

    Malicious actors choose reflection, not infection for record-setting DDoS attacks
    Number of DDoS attacks, peak bandwidth soar
    Spotlight: Record-setting DDoS attack
    Case study: WordPress DDoS pingback application reflection attack

  • Q4 2013 Global DDoS Attack Report

    Mobile applications being used for DDoS attacks
    Ease of use, widespread availability fuel growing threat
    Spotlight: Multi-vector DDoS campaign
    Case study: The Asian DDoS threat

  • Q3 2013 Global DDoS Attack Report

    DDoS perpetrators changed tactics to amplify attack sizes and hide identities
    Can now use smaller botnets to launch high-bandwidth attacks
    Attack spotlight: Multi-layer, multi-vector attack
    Case study: DrDoS reflection services within the underground marketplace

  • Q2 2013 Global DDoS Attack Report

    Significant increases in average DDoS attack bandwidth and packet-per-second rates
    Average packet-per-second and attack bandwidth rates rise 1,655 percent and 925 percent respectively.
    Case study: DrDoS (reflection) attack campaign

  • Q1 2013 Global DDoS Attack Report

    Giant attacks overwhelming appliances, ISPs, carriers, content delivery networks
    Average attack bandwidth totaled 48.25 Gbps in Q1 2013, a 718 percent increase over last quarter, with an average packet-per-second rate of 32.4 Mpps.
    Case study: Multi-vector attack campaigns

  • Q4 2012 Global DDoS Attack Report

    e-Commerce and SaaS businesses hit with 50+ Gbps DDoS attacks
    Increased scale and diversity of DDoS attacks and the enduring nature of botnets.
    Case study: Evolution of itsoknoproblembro

  • Q3 2012 Global DDoS Attack Report

    Intense 20 Gbps DDoS attacks become the new norm
    Seven DDoS attacks were mitigated with an average bitrate in excess of 20 Gbps, and the United States joined China as the most prolific sources of DDoS denial of service attacks.
    Case Study: itsoknoproblembro web-based DDoS suite

  • Q2 2012 Global DDoS Attack Report

    Perpetrators attempt to maximize botnet longevity
    Shorter but higher volume DDoS attacks hit businesses of all types as hackers try to maximize botnet longevity and revenue while minimizing the risk of discovery.
    Attack Spotlight: Dirt Jumper DDoS toolkit.

  • Q1 2012 Global DDoS Attack Report

    Financial services firms get hammered
    A significant increase in attack traffic was directed at financial services firms.

  • Q4 2011 Global DDoS Attack Report

    Attacks become more concentrated and damaging
    A dramatic rise in packet-per-second volume and significant attack activity against e-Commerce businesses

  • Q3 2011 Global DDoS Attack Report

    DDoS attackers change strategies
    Attackers start to target the DDoS mitigation infrastructure directly, specifically routers.

Contact Us