F5 networks: Middle East, Europe, Africa, the most vulnerable to DDoS attacks the group in the world

The gate Arab news technical

Revealed company F5 networks, about the new statistics indicate a continuing denial of service attacks distributed their growth and development in the Middle East, Europe and Africa.

On the basis of the data of the customer extracted from the security operations centre, a subsidiary of F5 networks, indeed, in Poland, it has experienced year 2017 increased by 64 percent on the level of security incidents e-the least severe, as the data refer also to the Europe, Middle East and Africa stand in a line in front of electronic threats, it has exceeded the region’s share ratio is 51 percent of the total global migrations registered during the year 2017.

Coinciding with this surge in the rate of threats, indicated that the results issued by the laboratories F5 networks indicates that the growth rate of customers using firewalls Application page E WAF during the past year amounted to 100 percent in Europe, Middle East and Africa, and at the same time, the higher the adoption rate and the adoption of solutions in the fight against fraud by 76 percent, and solutions to combat the DDoS attack increased by 58 percent.

The major change on the outside attacks represent the relatively low power and the spread of attacks single effort, over the past year, monitoring the security operations centre overflow attacks, multi-directional 100 Gbps, with the power of some of the 400 GB per second.

In comparison with the year 2017, we find that the greater power attack reached then 62 GB per second, which is the index for the existence of a trend towards adopting a DDoS attack is the most developed in the previous layer, which are often more influential and effective, although it does not require the use of bandwidth, and that 66 percent of the DDoS attack recorded was multi-vector, and address hiring programs and expertise to reduce the severity.

He said the entire Wozniak, Director of the center for security operations, a subsidiary of F5 networks: “contrary to the threats of denial-of-service distributed on the level of the region of Europe, Middle East and Africa compared to the rest of the world, as we observe significant changes in the scope of its spread and its degree of development compared to the year 2016”.

Added Wozniak: “companies should take the utmost caution about this challenge, and the allocation of priority to efforts to select and invest the appropriate solutions capable of stopping a DDoS attack DDOS, so before you reach the applications and negatively affect the functioning of the company’s operations, it is clear that the region of Europe, Middle East and Africa is one of the centers of the polarized migration at the global level, which can not be tolerated by the decision makers in this region.”

Started the first quarter of 2017, attack, thunderous, where the duty of the customer company F5 networks, a broader package of sabotage attacks recorded till date, have emerged from the attacks of the User Datagram Protocol, which accounted for 25 percent of the total attacks, and these attacks usually send the attackers for large packages of User Datagram Protocol to the destination one, or several random ports, with disguising themselves in the form of accredited entities before proceeding to steal important data, as the most common attacks that followed, she attacks reverse DNS “18 percent”, And then attacks the flow of synchronization “SYN Flood” by 16 percent, which is one of the types of DoS attacks.

Also saw the first quarter is also the peak of the spread of the attacks were Internet Control Message Protocol “ICMP”, in which cybercriminals spamming companies firmly repeated requests and rapid or what is known as a Ping, without waiting for responses.

In stark contrast, was divided attacks the first quarter of the year 2016 evenly between attacks, User Datagram Protocol, attacks Discovery Protocol simple service SSDP.

While the second quarter emergence of attacks the flow of the synchronization SYN Flood by 25 percent, followed by attacks Network Time Protocol attacks Protocol User Datagram 20 percent each.

Continuing the momentum of the attackers during the second quarter by the attacks User Datagram Protocol 26 percent, with the spread of the attacks the Network Time Protocol NTP, up from 8 percent recorded during the same period from the year 2016 to keep 22 percent, followed by attacks reverse DNS 17 percent.

Also record the year 2017 the dominance of more attacks User Datagram Protocol UDP, where the share amounted to 25 percent of the total attacks, as well as being the impetus for the reverse DNS, which accounted for 20 percent of the total attacks, compared with 8 percent recorded during the same period of 2017.

One of the key changes witnessed by the fourth quarter of the year, which confirms undoubtedly the ability of Internet hackers on innovation, expanding the spread of malicious software Ramnit Trojan to a large degree, which is designed primarily to target banks, but Labs company F5 networks, found that 64 percent of its goals during the holiday season was the e-commerce sites within the United States.

One of the objectives of the new other that was targeted by this malicious software sites relating to travel, entertainment, food, and dating, pornography, as emerged software other malicious targeting banks primarily, expanded the scope of spread objectives, namely, software Trickbot malware, which hit the victims during the attacks likely designed to penetrate the social networking sites, where you deceive users, non-specialists, and push them to clicking on links to malware, or download the file for malicious programs.

However, Wozniak said: “will continue vectors and attack evolution and change constantly at the level of the region of Europe, Middle East and Africa, and it is very important to choose the investment of corporate solutions and services appropriate for protection applications wherever you work, the record of the year 2017 an increase in the data traffic via the Secure Sockets Layer protocol SSL protocol / Transport Layer Security TLS-encrypted in the web, so it is necessary to measure solutions to mitigate a DDoS attack to study the nature of these attacks are evolving steadily. As to provide the overall vision and the biggest challenge at the level of each layer has become a necessity for all companies, so that you can keep their credibility and their association with closely with the customer, which will be of particular importance during the year 2018 to enter the General Regulations for the protection of data from the European Union comes into force”.

F5 networks: Middle East, Europe, Africa, the most vulnerable to DDoS attacks the group in the world

0 Comments on “F5 networks: Middle East, Europe, Africa, the most vulnerable to DDoS attacks the group in the world”

  1. oh, btw, I ordered my launchpads on the second day and got them within a week; just sayin’ because everyone else is complaining p

  2. I every time used to read article in news papers but now as I am a user of web thus from now I am using net for articles, thanks to web |

  3. Great beat ! I wish to apprentice while you amend your site, how could i subscribe for a blog website? The account aided me a acceptable deal I had been a little bit acquainted of this your broadcast offered bright clear idea|

Leave a Reply

Your email address will not be published. Required fields are marked *