Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Cybercrime
24/7/365 Network Uptime
Average Rating:
Rate this article:  
DDoS Web Attacks Rise in 2013, Harder To Fend Off
DDoS Web Attacks Rise in 2013, Harder To Fend Off

By Seth Fitzgerald
January 22, 2014 2:00PM

    Bookmark and Share
No matter what sector a business is in, protecting against DDoS attacks is important. Now that DDoS attacks are becoming more common, even large organizations and government-funded institutions have been taken offline for hours or days. Along with the troublesome downtime is an even more significant amount of lost money.
 



One of the easiest ways to disrupt any organization's online presence is through Distributed Denial of Service (DDoS) attacks. Unlike hacking or infiltrating a network, DDoS attacks simply overwhelm a site with meaningless traffic, causing it to become unreachable. This sort of cyberattack has been made famous by large hacking collectives such as Anonymous, and 2013 was the worst year on record for DDoS attacks, according to a new report.

With the financial sector estimating that each DDoS attack costs at least $100,000, protecting against them has become more important than ever before, especially as more business transactions begin to rely on the Internet.

Massive Increases

Prolexic Technologies, one of the leading providers of DDoS protection services, has released a report detailing some of the major DDoS trends it saw during 2013. Not only have the attacks become more common, Prolexic found, but they are now harder to defend against due to more sophisticated malware.

"Prolexic noted a clear evolution in the strategies and tactics malicious actors embraced over the past 12 months," the report said. "The tools used by malicious actors in 2013 and the tactics they adopted changed considerably, reflecting the ongoing evolution of the (DDoS) threat."

Unlike in the years prior to 2013, mobile devices are now being used to carry out attacks, making it even easier for malicious groups to take down a Web site.

"Although the use of mobile devices in these attacks is still minimal, it is expected to grow alongside the adoption of smartphones around the world," the report said.

Just as with actual hacks, many of the DDoS attacks have been coming from Asian countries, according to Prolexic's data. It has long been asserted that the Chinese government has been behind various attacks but with the prevalence of computers within China, no one is entirely sure who is behind many of the DDoS attacks.

Protection

No matter what sector a business is in, protecting against DDoS attacks is important. Now that these attacks are becoming more common, even large organizations and government-funded institutions have been taken offline for hours.

According to a report from Forrester Research, an attack "can last anywhere from hours to days, depending on how long it takes the victim to mitigate the traffic and how long the attacker can keep blasting the traffic at the victim's site and network."

Along with the troublesome downtime is an even more significant amount of lost money, especially with larger businesses, Forrester said.

"The estimated financial impact is $2.1 million dollars lost for every 4 hours down and $27 million for a 24-hour outage," the Forrester report said.

Before attackers began to adopt advanced techniques, individuals with knowledge of the network would be able to mitigate a DDoS attack by filtering out any request that appeared to be fake. Now, on-site and cloud-based services are usually required to prevent or quickly stop an attack, as they can be consistently updated and include multiple layers of protection. Unfortunately, in most scenarios, even those systems are unable to completely prevent attacks, but when money is at stake, less downtime is still beneficial.
 

Tell Us What You Think
Comment:

Name:



Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.


 Cybercrime
1.   Russian Hacker's Charges Revealed
2.   Germany Probes New U.S. Spy Case
3.   Russian Arrested in Hacking Case
4.   Cybercrime Ring Uncovered in Brazil
5.   Astros: Hackers Got Trade Info


advertisement
Germany Probes New U.S. Spy Case
Further fraying U.S., Berlin relations.
Average Rating:
IBM Uncovers Android Security Flaw
Ten percent of devices at risk.
Average Rating:
T1red of P@sswords? UR N*t @lone
New authentication systems surfacing.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Charges: Russian Stole Data from U.S. Restaurants, Zoo
A Russian man arrested on bank fraud and other charges hacked into computers at restaurants in Washington, hundreds of other retail businesses, and even the Phoenix Zoo, authorities say.
 
Another Month, Another IE-Focused Patch Tuesday
Microsoft rolled out 59 vulnerabilities for Internet Explorer in June. But the IE-patching party is not over yet. Redmond published six new security bulletins on Tuesday; two, critical; three, important.
 
Russian Arrested in Hacking Case Filed in Seattle
The U.S. Secret Service has arrested a Russian man who is accused of hacking store computers to steal thousands of credit card numbers, charging him with bank fraud, identity theft and more.
 

Enterprise Hardware Spotlight
Another Day, Another Internet of Things Consortium Is Born
In the emerging Internet of Things, zillions of devices will be talking to each other. Samsung, Intel and Dell just formed a consortium to ensure each thing can understand what others are saying.
 
Gartner Sales Study Sees Tablets Up, PCs Down but Recovering
Are PCs on the comeback trail? That depends on how you define "comeback." While tablet sales remain strong, Gartner's latest study found PC shipments aren't dropping as fast as they did last year.
 
Review: Warming Up to Tablets with Keyboard Covers
If you've ever thought tablets with keyboard covers were just a poor excuse for a laptop, think again. Nokia's Lumia 2520 comes with an optional keyboard cover that just may change your mind.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.