Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


November DDoS Assault Size Seen like Never before in 2011: Prolexic

Prolexic the security company reports a 7-day prevalent 'Distributed Denial-of-Service' assault, which caused innumerable traffic to the servers of one Asian e-commerce organization during November 2011, as the largest DDoS assault hitherto in 2011. PCWorld published this dated November 24, 2011.

The company states that the assault targeted approximately 250,000 PCs that contracted infection between November 5 and 12, 2011.

Notably according to Prolexic, the scale of the assault proved unexpectedly large; however, it shows what tendency DDoS assaults have imbibed currently with respect to growing complexity and size.

The Florida-based company's CTO Paul Sop stated that the number of assault strikes observed via the Asian cyber-event was capable of flooding any appliance that mitigated DDoS attacks. Furthermore, any ISP alternatively a prominent service that worked like a carrier too wouldn't have succeeded in lessening the DDoS Internet Protocol deluge. Infosecurity reported this on November 23, 2011.

Sop further stated that the multi-event, arbitrary assault's size became largest with 69m strikes/sec that used a 45 Gbps bandwidth/sec as also involved 15,000 connections every sec., all that were unprecedented.

Further according to him, the assault's size was threefold more with respect to the number of strikes/sec compared to the largest assault that Prolexic eliminated earlier during 2011.

Additionally, the security company stated that it had seen incidences that involved over 100 Gbps of bandwidth previously and that though the assaults were characteristically less severe currently, the rate at which they occurred had risen.

Meanwhile, Sop explained that the DDoS perpetrators utilized 6 types of signature definitions as well as an amalgamation of Layer 3 assault pushed via bandwidth and personalized Layer 7 assault specifically hitting the crucial software layer of the organization.

And while, it wasn't known why the attack occurred, two probable reasons could be a rival or disgruntled end-user carrying out industrial spying.

Besides, there were yet innumerable botnets that could harm 99% of all Internet sites online, Sop said.

Thus he alerted, citing other sectors like shipping, gaming and hospitality that they required being vigilant of DDoS attacks during Q4-2011 since botnet operations kept on spreading across the Asia-Pacific arena.

Related article: November Saw Spam Mails Jump By 35%

ยป SPAMfighter News - 12/2/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page