An enterprise relies on its IT infrastructure for nearly every internal and customer-facing function. Everything from informing prospects, to training staff, to processing multimillion dollar transactions is dependent on your stakeholders’ ability to access your website and your internal systems and applications. Securing those networks, from Denial of Service (DDoS) attacks and other cyber threats should be a key component to operating your business.Read more
Topics Trending in Cyber Security, DDoS, and Advanced Threat Detection
Just a few weeks ago, we released quarterly findings on how the DDoS threat landscape is trending as we close out Q3 2013 and head into the final quarter of the year. One of the most notable stats from that data – which was pulled from our ATLAS system and analyzed by our security experts in ASERT – was that the size of attacks is once again accelerating.Read more
It’s that time again – our quarterly data pull from ATLAS to glean new insight into DDoS attack trends and how they stack up for the year to date.
Here, I’m sharing a few of the more interesting findings from my own perspective.Read more
DDoS attacks continue to be a growing problem, and one that has evolved into a much more complex and hard to ward-off problem. Not only are large, volumetric attacks continuing to cause trouble for network operators and enterprises alike, but the increasing sophistication of attacks which specifically target business-critical applications now have the ability to stop business-as-usual altogether.Read more
Arbor Networks ATLAS data shows that Sudan dropped off the Internet around 9am ET on September 25. An article from the Associated Press may explain why.
And, according to the most recent ATLAS data, Internet traffic in Sudan returned in the morning on September 26. According to the data below, Internet traffic levels in Sudan have returned to normal levels.
Note: Times shown in the chart above are in UTC.
In a recent blog post, Dennis Schwarz, an engineer with Arbor’s Security Engineering & Response Team (ASERT) provides a detailed analysis of the Citadel malware for “Man in the Browser” attacks. This is an interesting attack because while the execution occurs locally on a user’s machine, it can have devastating effects on the risk profile of an entire organization.
Let’s look at how the attack manifests.Read more
From our founding more than a dozen years ago, Arbor has studied network traffic. We started as a research project at the University of Michigan, looking at routing instability on large distributed networks. This led from monitoring network traffic, and modeling it, to identifying anomalies related to DDoS attacks. With that, Arbor Networks was commercialized and the concept of wide-scale network behavior analysis was born.Read more
Research has always been a driving force behind much of what we do as a company. It’s how we were founded – out of groundbreaking research conducted at the University of Michigan. Our stable of security researchers are constantly exploring the threat landscape from a variety of angles, as you’ve no doubt seen on the ASERT blog. Our research roots is also how the annual Worldwide Infrastructure Security Report (WISR) originated, now in its eighth year. That report has always focused in on the issues and concerns facing our service provider customers, primarily.Read more
It’s always interesting to see the numbers and do a little historical comparison. Each data set brings a new trend to light and often a few surprises. Here are the highlights this quarter from my perspective.Read more