Attack Trends and Statistics

Through data forensics and post-attack analysis Akamai provides valuable data on the origins, tactics, types, and targets of cyber-attacks and emerging trends.

Attack Trends and Statistics

Malicious hackers launch thousands of distributed denial of service (DDoS) and web application attacks each day. It’s not just your website that is at risk, either. Large DDoS attacks are easy and inexpensive to launch and can inflict damage by taking down servers, web applications, automated communication systems, VoIP systems, email, bill-pay applications and more. Application attacks can steal valuable data and irreparably damage your company’s reputation.

Global DDoS and web security trends and emerging threats

Our quarterly security reports are based on data collected during recent cyber-attacks against our global customer base. Akamai’s Next Generation Content Delivery Network (CDN) is ideally positioned to collect valuable data on the origins, tactics, types, and targets of recent DDoS attacks and web application attacks and identify emerging DDoS trends. Through data forensics and post-attack analysis, Akamai builds a global view of attack trends and new cybersecurity threats.

Akamai’s quarterly State of the Internet: Security reports compare recent DDoS attack metrics and observations quarter-over-quarter and year-over-year, including:

  • Number of attacks
  • Attack size: bandwidth and volume
  • Attack duration: average and peaks
  • Specific types of attacks used
  • Target industries
  • Source countries
  • Spotlight on a recent attack, often the largest DDoS attack of the quarter
  • Case study of a hot-topic cybersecruity issue, such as a DDoS trend in attack toolkits, trends in botnet profiles, platforms targeted, vulnerabilities exploited, and new types of attacks
  • Other cybersecurity threats, such as phishing, web application attacks and more
attack report img

Download the most recent quarterly security report:

Q3 2015 State of the Internet – Security Report

Recent quarterly security reports:

  • Q1 2015 State of the Internet — Security Report

    DDoS attacks get smaller, but double in frequency and increase duration > 40 percent in duration
    Millions of web application attack triggers analyzed with a breakdown of seven common vectors
    Spotlight: 100+ Gbps mega attacks
    Case study: Security implications for IPv6
    Analysis: Malicious intentions behind real-world SQL injection attacks
    Emerging threat: Website defacements and domain hijacking

  • Q2 2015 State of the Internet — Security Report

    DDoS attacks double in frequency, while the number of mega attacks rises
    Shellshock vulnerability leveraged in 49% of web application attacks
    Spotlight: Multi-vector mega attacks leveraging SYN and UDP floods
    Case study: WordPress and the danger of third-party plugins
    Analysis: The pros and cons of Tor

  • Q4 2014 State of the Internet — Security Report

    The number of DDoS attacks nearly doubled in a year
    Nearly half of all DDoS attacks used multiple attack vectors
    Spotlight: A multiple TCP flags DDoS attack
    Case study: The evolution of malware
    Emerging threat: Bots, spiders and scrapers

  • Q3 2014 Global DDoS Attack Report

    Thriving criminal industry taps into Internet devices, spreads easy-to-use tools
    Four-fold increase in DDoS attack size and volume
    Spotlight: 321 Gbps DDoS attack
    Case study: DDoS botnets built from devices other than PCs and servers
    Emerging threat: Phishing attacks target third-party content providers

  • Archives – Quarterly Security Reports

Contact Us