Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:22 PM
Don Bailey
Don Bailey
Products and Releases
Connect Directly

Akamai Releases Second Quarter 2012 'State Of The Internet' Report

Akamai observed attack traffic from 188 unique countries/regions during the second quarter of 2012

CAMBRIDGE, Mass., Oct. 17, 2012 /PRNewswire/ --

-- Industry numbers show imminent global exhaustion of IPv4 addresses

-- Akamai identifies 460 times increase in IPv6 requests over its platform

from June 2011 - June 2012

-- During the quarter, approximately 38% of observed attack traffic

originated in the Asia Pacific/Oceania region; 36% from Europe;

23% from North and South America

-- Among top countries ranked by average measured connection speed, Japan

experienced largest year-over-year percentage growth (21 percent)

-- U.S. experienced 76% year-over-year growth in number of

connections at high broadband levels (greater than 10 Mbps) Akamai Technologies, Inc. (NASDAQ: AKAM), the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere, today released its Second Quarter, 2012 State of the Internet report.

Based on data gathered from the Akamai Intelligent Platform(TM), the report provides insight into key global statistics such as Internet penetration, mobile connection speeds, origins of attack traffic, and global and regional connection speeds.

(Logo: http://photos.prnewswire.com/prnh/20100225/AKAMAILOGO )

Featured analysis in the Second Quarter, 2012 State of the Internet report also includes an examination of mobile browser usage by network connection type collected via Akamai IO. In addition, the report provides a review of recent Internet disruptions in China and Syria measured using pertinent traffic patterns across the Akamai Intelligent Platform.

Highlights from Akamai's 2012 second quarter report:

Global Internet Penetration

More than 665 million IPv4 addresses from 242 countries/regions connected to the Akamai Intelligent Platform during the second quarter of 2012. The figure represents a 10% increase year over year. Given that a single IP address can represent multiple individuals in some cases, Akamai estimates the total number of unique Web users connecting to its platform during the quarter to be well over one billion.

Of the top 10 countries with the most unique IPv4 addresses connecting to the Akamai Intelligent Platform, Brazil experienced the largest growth, increasing

12 percent quarter over quarter, and 40% year over year.

Industry data, though, indicates that IPv4 addresses are rapidly being exhausted. RIPE, the European Internet registry, recently announced that it was down to its final block (~16 million) of IPv4 addresses, and ARIN, the regional Internet registry for the Americas, announced that it only had three blocks remaining.

With an IPv6 footprint in more than 50 countries, Akamai helped enable businesses that elected to participate in the Internet Society's June 6th, 2012 "World IPv6 Launch" make their content available over IPv6. IPv6 traffic on the Akamai Intelligent Platform grew significantly in the second quarter as customers of all sizes IPv6-enabled their Web sites ahead of the launch.

Attack Traffic and Top Ports Attacked

Akamai maintains a distributed set of agents deployed across the Internet that monitor attack traffic. Based on data collected by these agents, Akamai is able to identify the top countries from which attack traffic originates, as well as the top ports targeted by these attacks.

Akamai observed attack traffic from 188 unique countries/regions during the second quarter of 2012. This was up from 182 in the first quarter, with China remaining the single largest volume source of observed traffic at 16%.

The U.S. experienced a slight increase in originated attack traffic while staying in second place with 12%. Turkey rounded out the top three with a slight increase in the second quarter to 7.6 percent.

Nine out of the top 10 countries remained consistent, with the exception of Italy displacing Germany from the list. South Korea saw the most significant decrease in attack traffic originations among the top 10, dropping from 4.3 percent in the first quarter of 2012 to 2.1 percent this quarter.

The concentration of observed attack traffic targeting the top 10 ports dropped to 62% in the second quarter from 77% in the first quarter. The decline is largely attributable to fewer attacks against Port 445 after an unusually large increase in the first quarter. Port 445 was the single-most targeted in the second quarter, accounting for 32% of observed attack traffic.

Global Average and Peak Connection Speeds The global average connection speed increased 13% to 3.0 Mbps from the first to second quarters of 2012, continuing a trend of strong growth. South Korea continued to have the highest average connection speed at 14.2 Mbps for the quarter. Japan was second at 10.7 Mbps and Hong Kong was third at 8.9 Mbps.

Only two of the top 10 countries saw an increase in average connection speed during the second quarter, with Switzerland and the Czech Republic rising 4.0 percent to 8.4 Mbps and 0.7 percent to 7.2 Mbps, respectively. The remaining eight countries experienced declines ranging between 0.5 percent in Denmark to

9.8 percent in South Korea.

The most significant quarter-over-quarter increase in average connection speed was in Kenya, which rose 227% to 1.8 Mbps. The most dramatic decline occurred in Cote D'Ivoire, where the average connection speed dropped 29% to 0.4 Mbps.

Year-over-year trends remained generally positive, with global average connection speeds increasing by 15%, including growth in seven out of the top 10 countries.

The global average peak connection speed grew 44% year over year, including increases of 10% or more across all of the top 10 countries.

Worldwide, 126 countries saw increases, six of which grew in excess of 100% between the second quarters of 2011 and 2012. In contrast, only eight countries saw year-over-year declines.

Mobile Connectivity

The fastest mobile average connection speed in the second quarter of 2012 was

7.5 Mbps, delivered by a mobile provider in Russia. Six mobile providers had average connection speeds in the broadband (4 Mbps or better) range and 67 had average connection speeds greater than 1 Mbps during the quarter.

The fastest mobile average peak connection speed for the quarter came from a provider in the U.K. at 44.4 Mbps. Five providers had average mobile peak connection speeds over 20 Mbps and an additional 33 providers exceeded 10 Mbps.

All mobile providers had average peak speeds above 2 Mbps.

Mobile browser data from Akamai IO for the month of June shows approximately 38% of requests on cellular networks came from Android Webkit. Some 33% came from Mobile Safari; 23% from Opera Mini; and about 4% from Blackberry. The pattern changes when all networks (not just cellular) are included, with Mobile Safari accounting for an average of approximately 60% of requests. Android Webkit represented about 23%. All remaining mobile browsers were significantly lower. The information suggests that Android-powered devices are used more frequently on cellular networks, while iOS devices account for the bulk of WiFi usage.

About the Akamai State of the Internet report Each quarter, Akamai publishes a "State of the Internet" report. This report includes data gathered from across the Akamai Intelligent Platform about attack traffic, broadband adoption, mobile connectivity and other relevant topics concerning the Internet and its usage, as well as trends seen in this data over time. To learn more and to access the archive of past reports, please visit www.akamai.com/stateoftheinternet.

To download the figures from the Second Quarter, 2012 State of the Internet report, please visit http://wwwns.akamai.com/soti/soti_q212_figures.zip.

About Akamai

Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform(TM) providing extensive reach, coupled with unmatched reliability, security, visibility and expertise.

Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter. Don A. Bailey is a pioneer in security for mobile technology, the Internet of Things, and embedded systems. He has a long history of ground-breaking research, protecting mobile users from worldwide tracking systems, securing automobiles from remote attack, and mitigating ... View Full Bio

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.