Distributed denial-of-service (DDoS) attacks have skyrocketed this year, with a 389 percent increase in average attack bandwidth between the third quarter of 2013 and the third quarter of 2014, researchers said.
During the past quarter, Akamai Technologies, which conducted the research, defended against 17 DDoS attacks flooding targets with traffic greater than 100 Gbps, with the largest at 321 Gbps, the cloud services vendor said in its Q3 2014 State of the Internet security report.
A typical corporate connection to the Internet is between 1 to 10 Gbps, said John Summers, vice president of the company’s security business unit.
“We’ve seen a remarkable increase in the number of very large attacks,” he said. “If you do not have a way to defend [against a 100 Gbps attack], other than at the access into your infrastructure, you’re going down, there’s nothing you can do.”
Defending against DDoS attacks in the cloud gives companies the ability to “fight and deflect these attacks with a distributed infrastructure,” he added. “Instead of fighting one fire roaring at the edge of your data center, you’re able to fight it with 1,000 smaller fires, all scattered around the edges of the Internet.”
One extended campaign targeting a gaming site featured 39 distinct DDoS attacks over a two-month period, with eight of the attacks peaking at over 100 Gbps, Summers said.
The increases in DDoS attacks’ size and volume ended up fueled by the availability of attack toolkits with easy-to-use interfaces, a growing DDoS-for-hire criminal industry and a mass exploitation of Web vulnerabilities that allowed attackers to build huge botnets of compromised computers used to generate traffic, Akamai said.
Akamai saw a 22 percent increase in the number of DDoS attacks between the third quarter of 2013 and the third quarter of this year, but those attacks included a huge 366 percent increase in average peak packets per second in the traffic used to flood targeted websites.
The company is also seeing botnet farmers targeting a wider range of devices beyond PCs and servers, Summers said.
In past quarters, Akamai, had already seen smartphones used in botnets, but for the first time this past quarter, the company saw botnet attacks coming from devices using the ARM microprocessor, he said. The ARM chip sees use in embedded devices, digital TVs, smartphones, gaming consoles and smart sensors, among other devices.
Users are not frequently updating the firmware or running malware protection on cable modems and smartphones, making those devices attractive to botnet farmers, Summers said.
Akamai fears embedded and other devices will start to become a “larger part of the attack landscape,” Summers said. “People have built ways to crack into those devices, then install software that they … can launch DDoS attacks from.”
Compared to the second quarter, the amount of DDoS attacks Akamai measured was up 2 percent, but the average attack bandwidth was up 80 percent in the third quarter, with the average peak packets per second up 10 percent.
Online entertainment, media and technology companies were the most targeted in the third quarter, the company said. Nearly 24 percent of DDoS attacks originated from the U.S., 20 percent were from China and 18 percent were from Brazil, Akamai said.
Click here to register to download the report.