Distributed denial-of-service (DDoS) attacks continue to be complex and unpredictable, making them more challenging for companies to mitigate, global domain and internet service provider VeriSign said on Wednesday. DDoS attacks attempt to cripple machines or network resources by flooding them with requests from multiple IP addresses. Out of all the VeriSign customers targeted by DDoS attacks, 41 percent were targeted multiple times during the quarter. Also Read - Elon Musk slams Twitter and Google for rising scams, fake botsAlso Read - IRCTC sending warning emails to users against fraud tourism website, files FIR
“User Datagram Protocol (UDP), flood attacks continue to dominate in third quarter of this year, making up 49 percent of the total attacks,” VeriSign said. The most common UDP floods mitigated were Domain Name System (DNS) reflection attacks, followed by Network Time Protocol (NTP) reflection attacks. The highest intensity flood attack observed by VeriSign was a TCP SYN flood that peaked at approximately 60Gbps and 150Mpps.
This flood attack is one of the highest packets per second attacks ever observed by VeriSign, surpassing the previous highest flood of 125 Mpps mitigated by VeriSign in the fourth quarter of 2015. The largest attack in the third quarter of 2016 utilized the Generic Routing Encapsulation (GRE) protocol (IP protocol 47) and peaked at 250+ Gbps and 50+ Mpps. ALSO READ: Internet service providers face DDoS attack second time in the last three months