Attacks turned to cheaper, shorter attacks to try and disrupt targets, Imperva analysis shows.

4 Min Read

Distributed denial of service attacks appear to be getting smaller, shorter, and more persistent.

An analysis by Imperva of DDoS attack data from 2019 showed that more than 51% of network layer DDoS attacks lasted barely 15 minutes and another 10% or so for between 15 and 30 minutes. Only about one-in-five attacks lasted more than an hour and about four percent for between six and 12 hours.

The security vendor attributed the trend to the increasing availability and use of so-called "stresser" or DDoS for hire services that allow almost anyone to launch small attacks against targets of their choice for prices starting at around $5.

"Short duration attacks are cheaper," says Johnathan Azaria, data scientist at Imperva. "They disrupt the site’s function for the duration they're active and have a chance of crashing the site."

Though relatively small in nature, for victims such attacks can be disruptive all the same. Often though it might take just a few minutes to knock a site offline, recovery can take much longer, Azaria says. "In some cases the attack causes the website to shut down, not just slow down. It might be just a process that crashed, or that the server fell and needs to restart." When multiple processes and servers are involved, getting restarted even after a small DDoS attack can be time-consuming, Azaria says.

Criminals have long used DDoS attacks for a variety of reasons, including extortion, vandalism, hacktivism, and business rivalry. Many security experts expect a sharp increase in DDoS attacks this year by actors seeking to impact and influence the US presidential elections.

Just this week for instance, the FBI reportedly issued a so-called Private Industry Notification (PIN) alerting about a DDoS campaign that targeted a state voter registration and voter information website.

In this particular case, the attackers reportedly hit the DNS server of the voter registration website with short bursts of DNS requests in a bid to crash the server. BleepingComputer, which was the first to report on the so-called Pseudo Random Subdomain (PRSD) DDoS attack on the voter registration site, described it as occurring in short bursts over a one-month period.

"PRSD attacks are a type of DNS flood," says Avishay Zawoznik, Security Research Manager at Imperva. Such attacks have the potential to exhaust the resources of the authoritative server and limit its ability to function properly.

PSRD attacks are relatively easy to pull off and are likely available as part of some DDoS for hire services. "The nature of the attack is simple and easy to pull off, assuming the attacker has enough bandwidth," Zawoznik says.

Imperva's analysis showed that about two-thirds of those who were attacked last year were hit up to five times with short duration DDoS floods. Twenty-five percent were attacked 10 times or more.

Imperva defines a single DDoS attack as one that lasts at least five minutes. Azaria says. A network-layer DDoS attack is considered finished after three hours have passed with no malicious traffic detected. For application layer attacks, the company's threshold for an attack to be considered as finished is 30 minutes without malicious traffic.

Small Attacks

About nine-in-10 (87%) of DDoS attacks at the network layer were small and topped out at 50 Gbps. Ninety-seven percent reached no more than 50 Mpps (million packets per second).

Application layer DDoS attacks—which are designed to deplete system resources such as CPU and RAM—were similarly small with most topping out at about 1,000 requests per second. As with network layer attacks, Imperva attributed the relatively small nature of application level attacks to the use of stresser services.

Some 3,643 of the DDoS attacks that Imperva helped customers address happened at the network layer and 42,390 were application layer DDoS attacks. For those hit by such attacks, the type of DDoS flood unlikely makes much of a difference from an impact standpoint, Azaria says. "It really depends on the skills of the attacker and how well he knows his target," he says. "Both can cause the website to malfunction to a point it's not usable. Both can be difficult to mitigate.

"A majority of the machines used to launch application and network layer DDoS attacks last year were located in China and the Philippines, Imperva noted.

Organizations in the fiercely competitive gaming and gambling sectors continued to be the most heavily targeted in DDoS attacks last year, followed by technology companies and business entities. From a regional standpoint organizations in India were most heavily targeted in DDoS attacks last year.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "C-Level & Studying for the CISSP."

About the Author(s)

Jai Vijayan, Contributing Writer

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights