Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:00 PM
Connect Directly

Majority of Network, App-Layer DDoS Attacks in 2019 Were Small

Attacks turned to cheaper, shorter attacks to try and disrupt targets, Imperva analysis shows.

Distributed denial of service attacks appear to be getting smaller, shorter, and more persistent.

An analysis by Imperva of DDoS attack data from 2019 showed that more than 51% of network layer DDoS attacks lasted barely 15 minutes and another 10% or so for between 15 and 30 minutes. Only about one-in-five attacks lasted more than an hour and about four percent for between six and 12 hours.

The security vendor attributed the trend to the increasing availability and use of so-called "stresser" or DDoS for hire services that allow almost anyone to launch small attacks against targets of their choice for prices starting at around $5.

"Short duration attacks are cheaper," says Johnathan Azaria, data scientist at Imperva. "They disrupt the site’s function for the duration they're active and have a chance of crashing the site."

Though relatively small in nature, for victims such attacks can be disruptive all the same. Often though it might take just a few minutes to knock a site offline, recovery can take much longer, Azaria says. "In some cases the attack causes the website to shut down, not just slow down. It might be just a process that crashed, or that the server fell and needs to restart." When multiple processes and servers are involved, getting restarted even after a small DDoS attack can be time-consuming, Azaria says.

Criminals have long used DDoS attacks for a variety of reasons, including extortion, vandalism, hacktivism, and business rivalry. Many security experts expect a sharp increase in DDoS attacks this year by actors seeking to impact and influence the US presidential elections.

Just this week for instance, the FBI reportedly issued a so-called Private Industry Notification (PIN) alerting about a DDoS campaign that targeted a state voter registration and voter information website.

In this particular case, the attackers reportedly hit the DNS server of the voter registration website with short bursts of DNS requests in a bid to crash the server. BleepingComputer, which was the first to report on the so-called Pseudo Random Subdomain (PRSD) DDoS attack on the voter registration site, described it as occurring in short bursts over a one-month period.

"PRSD attacks are a type of DNS flood," says Avishay Zawoznik, Security Research Manager at Imperva. Such attacks have the potential to exhaust the resources of the authoritative server and limit its ability to function properly.

PSRD attacks are relatively easy to pull off and are likely available as part of some DDoS for hire services. "The nature of the attack is simple and easy to pull off, assuming the attacker has enough bandwidth," Zawoznik says.

Imperva's analysis showed that about two-thirds of those who were attacked last year were hit up to five times with short duration DDoS floods. Twenty-five percent were attacked 10 times or more.

Imperva defines a single DDoS attack as one that lasts at least five minutes. Azaria says. A network-layer DDoS attack is considered finished after three hours have passed with no malicious traffic detected. For application layer attacks, the company's threshold for an attack to be considered as finished is 30 minutes without malicious traffic.

Small Attacks

About nine-in-10 (87%) of DDoS attacks at the network layer were small and topped out at 50 Gbps. Ninety-seven percent reached no more than 50 Mpps (million packets per second).

Application layer DDoS attacks—which are designed to deplete system resources such as CPU and RAM—were similarly small with most topping out at about 1,000 requests per second. As with network layer attacks, Imperva attributed the relatively small nature of application level attacks to the use of stresser services.

Some 3,643 of the DDoS attacks that Imperva helped customers address happened at the network layer and 42,390 were application layer DDoS attacks. For those hit by such attacks, the type of DDoS flood unlikely makes much of a difference from an impact standpoint, Azaria says. "It really depends on the skills of the attacker and how well he knows his target," he says. "Both can cause the website to malfunction to a point it's not usable. Both can be difficult to mitigate.

"A majority of the machines used to launch application and network layer DDoS attacks last year were located in China and the Philippines, Imperva noted.

Organizations in the fiercely competitive gaming and gambling sectors continued to be the most heavily targeted in DDoS attacks last year, followed by technology companies and business entities. From a regional standpoint organizations in India were most heavily targeted in DDoS attacks last year.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "C-Level & Studying for the CISSP."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). A dangerous AT command was made available even though it is unused. The LG ID is LVE-SMP-200010 (June 2020).
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS software before 2020-06-01. Local users can cause a denial of service because checking of the userdata partition is mishandled. The LG ID is LVE-SMP-200014 (June 2020).
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via a custom AT command handler buffer overflow. The LG ID is LVE-SMP-200007 (June 2020).
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via an MTK AT command handler buffer overflow. The LG ID is LVE-SMP-200008 (June 2020).
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 9 and 10 (MTK chipsets). An AT command handler allows attackers to bypass intended access restrictions. The LG ID is LVE-SMP-200009 (June 2020).