Security Experts:

Connect with us

Hi, what are you looking for?



Multi-vector DDoS Attacks Grow in Sophistication

A new report from Arbor Networks shows that while the size of distributed denial-of-service attacks have started to plateau, application-layer and multi-vector attacks continue to evolve.

A new report from Arbor Networks shows that while the size of distributed denial-of-service attacks have started to plateau, application-layer and multi-vector attacks continue to evolve.

In a survey of 130 network operators, Arbor found that 46 percent reported multi-vector attacks that use combinations of volumetric, state-exhaustion and application-layer attack vectors to hit organizations at the same time. These attacks are challenging, the firm argues, because they require layered solutions across the data center and the cloud to be mitigated successfully. This is a significant increase from last year’s report, when just 27 percent of respondents reported these attacks.

DDoS Attacks GrowAs for application-layer attacks, 86 percent of respondents reported experiencing those kinds of attacks. According to Arbor, the proportion of reported application-layer attacks has not changed much during the last few years for most services such as HTTP, DNS and SMTP. The only clear change the company found was in relation to HTTPS, with 37 percent of the respondents seeing application-layer attacks targeting this service compared to 24 percent last year.

“There is a very clear trend we see in the increased use of complex multi-vector and application layer attacks,” said Gary Sockrider, solutions architect for the Americas for Arbor. “These methods are inherently more difficult to defend against and also more difficult to detect. In disguising the attacks as web traffic (HTTP) and even encrypting them (HTTPS) the malicious traffic attempts to hide by mixing in with legitimate traffic destined for the victim.”

This year’s survey also found an increase level of concern regarding compromised machines on provider networks, with 61 percent naming botted computers as a top concern.

“The increase in botted hosts is not surprising given the number and complexity of malware variants that exist, their rate of evolution and the consequent inability of Intrusion Detection Systems (IDS) and Anti-Virus (AV) systems to fully protect them,” according to the report. “Looking ahead, there is even more concern about APT, industrial espionage, data exfiltration and malicious insiders.”

There has been a substantial increase in the proportion of respondents using Intelligence DDoS Mitigation Systems (IDMS) to mitigate attacks, which has jumped to 60 percent from 45 percent.  However, 78 percent of respondents indicated that their organization has dedicated operational security resources, a decrease from last year.  

“The most surprising thing that I saw was the reduction in dedicated security resources among respondent organizations,” Sockrider said. “This is further explained by the next question we asked. The key challenges facing respondents when building and maintaining an effective operational security team were a “lack of headcount and resources” and “difficulty in finding and retaining skilled personnel.” However, lack of both operating expense budget and capital funding were cited as issues by more of our respondents than in previous years, potentially indicating that cost reductions within network operations have had an impact here.”

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.


The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...