How to Predict the Future in the Palm Lines of the Web


Anticipating what society will look like after the lockdown is no easy task. That being said, given the lightning speed of technological development, it doesn’t take a visionary to foresee the next challenges facing us in the world of cybersecurity in the short and medium term.

Has there actually been a change? Or are we just using the usual applications more?

Traffic Booms

The answer is unambiguous: yes, there is a change and a very significant one.

As people who take the lead from science, we can back up our predictions with detailed facts, using the data we have about the type of traffic that has moved through the Internet, as well as the services behind that traffic. The following table of data illustrates very clearly what is happening.

Global traffic growth between February 1 and April 19
Source: Sandvine reports

Internet traffic grew by 40% worldwide, but if we look a little closer, we see that the upstream traffic grew by 121%. This is clearly a new situation at technological level: we have gone from being receivers of data, to sending data massively.

[You may also like: Ensuring Remote Access Availability & Security]

A Breeding Ground for Hackers

It doesn’t take a genius to understand this development. Applications for telepresence, teleworking, virtual classrooms or simply talking to our loved ones are those most used these days and therefore we generate videos, sound and even data that we upload or exchange with others. All this brings about a complete paradigm change to the design of home networks, narrowing the gap between uploading and downloading data.

But there is also a very important factor behind this change: the traffic handled by these telepresence applications is UDP traffic. We probably need to explain to anyone not well read up on network technology that UDP traffic is a protocol focusing on speed, not quality, and therefore very far from the concepts of network security, a breeding ground for hackers.

As expected, most of the attacks carried out during March 2020 used the UDP traffic protocol (71%), camouflaged within the avalanche generated by the lockdown and use of telepresence applications. This poses a huge challenge for businesses as it is not easy to distinguish between trusted traffic and malicious traffic in the UDP protocol.

You can see the next question coming.

[You may also like: Beware the Security Threats from Remote Working]

Can’t we just distinguish between “good” traffic and “bad” traffic?

Unfortunately not, the next challenge is inherent in the telepresence application. Digital identification has gone from being an option to being a necessity. The following image shows why.

Search trends of the word “SEPE” in Spain
Source: Google Trend

The sector most affected by the lockdown is the labor market and we can see one of its direct effects in the above image (trend according to Google Trend on the word “SEPE”, i.e. Servicio Público de Empleo Estatal – State Public Employment Service): a surge in requests for various types of official formalities. With the lockdown measures applied, all the formalities had to be done through the Internet, so the question is obvious: how can we identify ourselves on the Internet?

Bots Everywhere

Unfortunately, in Spain, the electronic ID is simply an option, far from being commonly applied, and the same is true of the digital certificate or any other system, so for the time being more rudimentary procedures have been used.

From a technological point of view, architectures like Blockchain (designed for this type of situation) have not yet arrived, so in the short and medium term the first step is to mitigate, that is, to filter the reliable users from those who have darker intentions, which 75% of the time are bots.

Nearly 30% of the Internet is malicious bots, that is, a third of the traffic that reaches public services is junk; it simply wastes resources or tries to find weaknesses in the system to gain some kind of advantage.

In the case of public administration and socially sensitive issues such as the aid provided by the Spanish state to its citizens, ensuring digital identity is a pressing need. It is not only a question of technology or security on the net, it is the new scenario that is being written, a world where the “face to face” is going to be replaced by telepresence. We did not foresee this scenario and, only logically, we are arriving late at the table, but it is a challenge we can take up by using the different technological and organizational solutions that we already have at hand.

Note: A version of this article originally appeared in ISMS Forum.

Read Radware’s “The Big Bad Bot Report” to learn more.

Download Now


  1. A good article, a good book can change the fate of so many people. Thanks for the valuable sharing, please keep it up to date and I will always follow you.

  2. Simply wіsh to saʏ your article іs aas astonishing.
    The clarity fօr yοur publish іs simply spectacular аnd tһаt i can think you aгe a professional in this
    subject. Welⅼ tⲟgether wіth yοur permijssion ɑllow me to grasp ʏour feeed to kеep up tto Ԁate wіth draaing close post.
    Thank you 1,000,000 and pleasе continue tһe enjoyable work.

  3. Hi! Ԝould уou mind if I share yoսr blog ᴡith my zynga group?Тheгe’s
    a lot օf people that I thіnk would really enjoy yoᥙr ⅽontent.

    Pⅼease let me қnoѡ. Thank you

  4. Tһank you fօr thе auspicious writeup. It
    if truth ƅe told was օnce a anusement account іt.
    Glance advanced to m᧐re added agreeable frоm уou! However, how can we ҝeep ᥙp a correspondence?

  5. Hello, i think thɑt i saѡ уou visited my web site thus i came tօ “return tһe
    favor”.I aam tryіng to find tһings to enhance mү site!I
    suppose іts օ᧐k tоo use ѕome of your ideas!!

  6. Whаt’s Happening i am new t᧐ this, I stumbled uρon thіs
    Ihave discovered It positively helpful ɑnd it
    hɑs helped me ⲟut loads. I hope to contribute & aiid other customers ⅼike
    іts aided mе. Great job.

  7. Heⅼlo, i read ʏour blog occasionally ɑnd i own a ѕimilar one and
    і was јust curious if үou gеt a lot of spam remarks?
    If ѕo hhow do you protect ɑgainst it, any plugin or anythіng
    you ϲan suggest? I get so much lately it’sdriving me crazy so any support is very muсһ appreciated.


Please enter your comment!
Please enter your name here