Attack Trends and Statistics

Through data forensics and post-attack analysis Akamai provides valuable data on the origins, tactics, types, and targets of cyber-attacks and emerging trends.

Attack Trends and Statistics

Malicious hackers launch thousands of distributed denial of service (DDoS) attacks each day. It’s not just your website that is at risk, either. Large DDoS attacks are easy and inexpensive to launch and can inflict damage by taking down servers, web applications, automated communication systems, VoIP systems, email, bill-pay applications and more.

Global DDoS trends and emerging threats

Our quarterly security reports are based on data collected during recent cyber-attacks against our global customer base. Akamai is ideally positioned to collect valuable data on the origins, tactics, types, and targets of recent DDoS attacks and identify emerging DDoS trends. Through data forensics and post-attack analysis, Akamai builds a global view of DDoS trends and new cybersecurity threats.

Akamai’s quarterly State of the Internet: Security reports compare recent DDoS attack metrics and observations quarter-over-quarter and year-over-year, including:

  • Number of attacks
  • Attack size: bandwidth and volume
  • Attack duration: average and peaks
  • Specific types of attacks used
  • Target industries
  • Source countries
  • Spotlight on a recent attack, often the largest DDoS attack of the quarter
  • Case study of a hot-topic issue, such as a DDoS trend in attack toolkits, trends in botnet profiles, platforms targeted, vulnerabilities exploited, and new types of attacks
  • Other cybersecurity threats, such as phishing, web application attacks and more
attack report img

Download the most recent quarterly security report:

Q1 2015 State of the Internet – Security Report

Recent quarterly security reports:

  • Q4 2014 State of the Internet — Security Report

    The number of DDoS attacks nearly doubled in a year
    Nearly half of all DDoS attacks used multiple attack vectors
    Spotlight: A multiple TCP flags DDoS attack
    Case study: The evolution of malware
    Emerging threat: Bots, spiders and scrapers

  • Q3 2014 Global DDoS Attack Report

    Thriving criminal industry taps into Internet devices, spreads easy-to-use tools
    Four-fold increase in DDoS attack size and volume
    Spotlight: 321 Gbps DDoS attack
    Case study: DDoS botnets built from devices other than PCs and servers
    Emerging threat: Phishing attacks target third-party content providers

  • Q2 2014 Global DDoS Attack Report

    Malicious actors switch tactics to build, deploy and conceal powerful botnets
    Attack activity remains elevated
    Spotlight: A powerful botnet –powered DNS attack
    Case study: Botnet construction based on web vulnerabilities

  • Q1 2014 Global DDoS Attack Report

    Malicious actors choose reflection, not infection for record-setting DDoS attacks
    Number of DDoS attacks, peak bandwidth soar
    Spotlight: Record-setting DDoS attack
    Case study: WordPress DDoS pingback application reflection attack

  • Q4 2013 Global DDoS Attack Report

    Mobile applications being used for DDoS attacks
    Ease of use, widespread availability fuel growing threat
    Spotlight: Multi-vector DDoS campaign
    Case study: The Asian DDoS threat

  • Q3 2013 Global DDoS Attack Report

    DDoS perpetrators changed tactics to amplify attack sizes and hide identities
    Can now use smaller botnets to launch high-bandwidth attacks
    Attack spotlight: Multi-layer, multi-vector attack
    Case study: DrDoS reflection services within the underground marketplace

  • Archives – Quarterly Security Reports

Contact Us