NETSCOUT Releases Annual Worldwide Infrastructure Security ReportNETSCOUT Releases Annual Worldwide Infrastructure Security Report
DDoS Attack Size Explodes Worldwide: SaaS and Cloud Services Increasingly Targeted
March 20, 2019
WESTFORD, Mass., March 20, 2019 – NETSCOUT SYSTEMS, INC., (NASDAQ: NTCT), a leading provider of service assurance, security, and business analytics, today released its 14thannual Worldwide Infrastructure Security Report (WISR), offering direct insights into a wide range of security and operational challenges facing service provider and enterprise network operators around the world, and the strategies adopted to address and mitigate them.
In addition to the survey results, the WISR is supplemented with global threat intelligence from NETSCOUT’s Active Threat Level Analysis System (ATLAS®) infrastructure. ATLAS has visibility into approximately one-third of all internet traffic, delivering a truly comprehensive view into internet traffic, trends, and threats.
Digital Transformation strategies are under attack. Digital Transformation is critical to service providers looking to capture new revenue opportunities and enterprises looking to run efficient, scalable, high performing businesses. This has the attention of attackers, who are increasingly targeting these new services.
· SaaS Services: Threefold YoY increase in the number of DDoS attacks against SaaS services, from 13 percent to 41 percent.
· Third Party Data Center and Cloud Services: Threefold YoY increase in the number of DDoS attacks against third party data centers and cloud services, from 11 to 34 percent.
· Targeting Encrypted Traffic: The increasing use of encrypted traffic was reflected in the growing rate of attacks targeting it. In 2018, 94 percent observed such attacks, nearly twice the percentage as the previous year.
· For Service Providers: Cloud-based services were increasingly targeted by DDoS attacks, up from 25 percent in 2016 to 47 percent in 2018.
Getting Political. DDoS has long been a tool for online protests, thanks to the combination of increasingly sophisticated for-hire DDoS attack services and free attack tools that enable anyone with basic online skills to launch an attack.
In 2018, 60 percent of service providers witnessed attacks traversing their networks that were targeting governments, up from 37 percent last year. As political instability increases around the world, expect DDoS to continue to be used as a form of protest.
DDoS Attacks Continue to Evolve. In 2018, DDoS attack size exploded to a record-breaking 1.7Tbps in size, and the targets and techniques continue to evolve.
· 91 percent of enterprises who experienced a DDoS attack indicated that one or more completely saturated their internet bandwidth.
· Attackers shifted their focus to stateful infrastructure attacks targeting Firewalls and IPS devices. These attacks almost doubled from 16 percent to 31 percent.
· Of those who experienced stateful attacks, 43 percent reported that their Firewall and/or IPS contributed to an outage during the attack.
· 36 percent of enterprises experienced complex multi-vector attacks targeting bandwidth, stateful infrastructure and applications.
High Cost of Downtime. For 2018, the average global cost of one hour of downtime associated with internet service outages caused by DDoS attacks was $221,836.80. Germany had the highest downtime costs, at $351,995. Meanwhile, Japan paid the least for an hour of network downtime at $123,026.
NETSCOUT surveyed our service provider customers who can offer direct insights into a wide range of topics, from cyber-attacks to major industry trends such as SDN/NFV and Digital Transformation, to key organizational issues such as incident response training, staffing, and budgets. This year, for the first time, NETSCOUT also surveyed enterprise security, network and IT decision makers across seven countries, US, Canada, Brazil, UK, France, Germany and Japan.
· Visit the NETSCOUT ASERT blog for insight on various aspects of the report and to download the full report.
· Find us on Facebook and follow @Netscout on Twitter for more key findings.
NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) assures digital business services against disruptions in availability, performance, and security. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility, and insights customers need to accelerate, and secure their digital transformation. Our approach transforms the way organizations plan, deliver, integrate, test, and deploy services and applications. Our nGenius service assurance solutions provide real-time, contextual analysis of service, network, and application performance. Arbor security solutions help protect against DDoS attacks that threaten availability, and advanced threats that infiltrate networks to steal critical business assets. To learn more about improving service, network, and application performance in physical or virtual data centers, or in the cloud, and how NETSCOUT’s performance and security solutions, powered by service intelligence can help you move forward with confidence, visit www.netscout.com or follow @NETSCOUT and @ArborNetworks on Twitter, Facebook, or LinkedIn.
©2019 NETSCOUT SYSTEMS, INC. All rights reserved. NETSCOUT and the NETSCOUT logo are registered trademarks of NETSCOUT SYSTEMS, INC. and/or its subsidiaries and/or affiliates in the USA and/or other countries.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Quantifying the Gap Between Perceived Security and Comprehensive MITRE ATT&CK Coverage
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Supply Chain Cyber Risk Management Whitepaper