In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-27 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
DDoS attacks are becoming more and more widespread, although the protection technology is also gradually enhanced, but the attacks will still spread through a variety of means and means of evolution. Some researchers have found a new version of the attack through the use of malware and zombie access to attack devices such as routers. According to statistics, attacks that are more difficult to defend and the number of attacks will continue to grow.
Despite the unremitting efforts of security and law enforcement departments to maintain, DDoS attacks still pose a great threat to enterprises. According to the survey statistics, large enterprises feel that DDoS attacks are still the biggest hidden danger in network security, so many security service personnel are very worried about it.
Next, the main analysis of the domestic DdoS attacks in the first quarter of 2019: the proportion of persistent attacks almost doubled from 0.11% to 0.21% compared with the Q4 quarter of 2018. And the duration and types of attacks are on the rise, with SYN Flood still accounting for the largest share of spam traffic compared with Q4 last year. Compared with UDP Flood and TCP Flood, the share has decreased. However, the share of HTTP Flood and ICMP increased to some extent, but still ranked last. The figure below is as follows
Type Distribution of Q1 DDoS attacks in 2019
At the same time, the number of Linux botnets far exceeds that of Windows botnets, with Linux botnets accounting for 95.71% of the total, while the share of Windows botnets has increased to 4.29%.
According to the CNCERT sampling monitoring data: through the control terminal resources in the first quarter of 2019, the average monthly use of broilers to launch DDoS attacks is 230. an average of 29 control terminals are in China, and 201 control terminals are overseas. In China, according to provincial statistics, Jiangsu Province accounts for more than 20%, followed by Guangdong Province; according to the statistics of operators, telecom accounts for 66.5%, followed by Unicom and China Mobile.
According to CNCERT sampling monitoring data, there are an average of 195694 broiler addresses per month to simulate real address attacks through broiler resources in the first quarter of 2019. These broiler resources are counted by provinces: Guangdong Province, Jiangsu Province and Zhejiang Province account for the largest proportion, followed by Fujian Province and Henan Province; according to the statistics of operators: the proportion of telecommunications is 74.5%, followed by Unicom and China Mobile.
For reflection server resource attacks, including NTP, SSDP reflection attacks, mainly accounted for the largest proportion in Shandong, Guangdong, Central Plains and Northeast China and other places, according to the operator statistics Unicom accounted for a relatively large proportion.
From this, we can see that DDOS attack resources are mainly concentrated in the southern region, and the data show that they are still in the stage of continuous growth, and the main targets of attacks are also concentrated in blockchain, payment platforms, games, website malls and other industries, and we will continue to pay attention to these industries in the future. Make corresponding solutions to this kind of industry attacks and minimize the losses as far as possible.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.