DDoS attack volumes plummet as NTP servers got patched

  • 5 August 2014
  • 0 replies
  • 168 views

Userlevel 7
By/ HNS Staff/ Posted on 05 August 2014.
 
Wise to attackers’ exploitation of the Network Time Protocol (NTP) vulnerability to create distributed reflection denial of service (DrDoS) attacks, information security executives thwarted these types of amplified assaults by patching weaknesses or making upgrades in their systems associated with the protocol, causing an 86 percent drop in the peak bit volume of NTP DrDoS attacks to 59 gigabits per second (Gbps) in Q2 2014.

http://www.net-security.org/images/articles/ddos.jpg
In contrast, traditional multi-vector attacks against servers and websites have resurfaced as the most frequent, severe threat to enterprises and service providers, with a 140 percent increase in TCP SYN and HTTP GET types of attacks in the same period. Enterprises and operators are cautioned to protect against SYN flood attacks, which, although smaller in size, are highly effective and difficult to stop without purpose-built commercial DDoS mitigation hardware or services. ere
Help Net Security/ Full Article Here/ http://www.net-security.org/secworld.php?id=17206

0 replies

Be the first to reply!

Reply