One of the prominent trends in 2017 was an increase in short-burst attacks, which have become more complex, more frequent and longer in duration. Burst tactics are typically used against gaming websites and service providers due to their sensitivity to service availability as well as their inability to sustain such attack maneuvers.
Timely or random bursts of high traffic rates over a period of days or even weeks can leave the targeted organization with no time to respond—causing a severe service disruption.
What do these findings mean for you?
If your online presence is critical for your revenue generation or business operations – The question of burst attacks should be discussed with your DDoS mitigation provider. Here are several answers you may hear:
- Provider: What is a burst attack?
- Provider: Yes, we also protect against burst attacks.
- Your provider has no clue what a burst attack is. Send him Radware’s 2018 ERT report and switch your provider.
- Provider: We look at the repetitive pattern of burst attacks to fine-tune your protections
- Keep with your DDOS mitigation provider. You are in good hands.
42% of organizations suffered DDoS attacks in recurring bursts. These attacks lasted no more than a few minutes for most victims. This information and more about IoT driven DDoS attacks can be found in Cisco’s Annual Cyber Security Report (ACR) 2018.
Radware contributed to Cisco’s 2018 ACR, discussing DDoS attack trends, the threat of IoT botnets and theexpansion of burst attacks and reflection amplification attack techniques.