Security Experts:

Connect with us

Hi, what are you looking for?



Multi-vector DDoS Attacks Grow in Sophistication

A new report from Arbor Networks shows that while the size of distributed denial-of-service attacks have started to plateau, application-layer and multi-vector attacks continue to evolve.

A new report from Arbor Networks shows that while the size of distributed denial-of-service attacks have started to plateau, application-layer and multi-vector attacks continue to evolve.

In a survey of 130 network operators, Arbor found that 46 percent reported multi-vector attacks that use combinations of volumetric, state-exhaustion and application-layer attack vectors to hit organizations at the same time. These attacks are challenging, the firm argues, because they require layered solutions across the data center and the cloud to be mitigated successfully. This is a significant increase from last year’s report, when just 27 percent of respondents reported these attacks.

DDoS Attacks GrowAs for application-layer attacks, 86 percent of respondents reported experiencing those kinds of attacks. According to Arbor, the proportion of reported application-layer attacks has not changed much during the last few years for most services such as HTTP, DNS and SMTP. The only clear change the company found was in relation to HTTPS, with 37 percent of the respondents seeing application-layer attacks targeting this service compared to 24 percent last year.

“There is a very clear trend we see in the increased use of complex multi-vector and application layer attacks,” said Gary Sockrider, solutions architect for the Americas for Arbor. “These methods are inherently more difficult to defend against and also more difficult to detect. In disguising the attacks as web traffic (HTTP) and even encrypting them (HTTPS) the malicious traffic attempts to hide by mixing in with legitimate traffic destined for the victim.”

This year’s survey also found an increase level of concern regarding compromised machines on provider networks, with 61 percent naming botted computers as a top concern.

“The increase in botted hosts is not surprising given the number and complexity of malware variants that exist, their rate of evolution and the consequent inability of Intrusion Detection Systems (IDS) and Anti-Virus (AV) systems to fully protect them,” according to the report. “Looking ahead, there is even more concern about APT, industrial espionage, data exfiltration and malicious insiders.”

There has been a substantial increase in the proportion of respondents using Intelligence DDoS Mitigation Systems (IDMS) to mitigate attacks, which has jumped to 60 percent from 45 percent.  However, 78 percent of respondents indicated that their organization has dedicated operational security resources, a decrease from last year.  

“The most surprising thing that I saw was the reduction in dedicated security resources among respondent organizations,” Sockrider said. “This is further explained by the next question we asked. The key challenges facing respondents when building and maintaining an effective operational security team were a “lack of headcount and resources” and “difficulty in finding and retaining skilled personnel.” However, lack of both operating expense budget and capital funding were cited as issues by more of our respondents than in previous years, potentially indicating that cost reductions within network operations have had an impact here.”

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...