DoS scum attacked one-third of the 'net between 2015 and 2017

Even CHARGEN services are hosed, daily, says CAIDA study


One-third of all /24 networks recently estimated to be active on the Internet have suffered at least one denial-of-service attack over the last two years.

That's the headline number from a two-year study conducted by the Center for Applied Internet Data Analysis (CAIDA), published last week.

CAIDA conducted the study to provide a “framework to enable a macroscopic characterisation of attacks, attack targets, and mitigation behaviours”.

To get that macroscopic view, the study's international group of six authors used two raw data sources: CAIDA's UCSD Network Telescope (explained here), and the AmpPot network of DDoS honeypots (here). Their two secondary data sources were OpenINTEL (an active DNS measurement project) and data gathered from DDoS prevention companies like Cloudflare and others.

Their data showed 2.2 million /24 networks (one third of the address space) experienced 20 million attacks during the study, either as direct DoS attacks or some kind of reflection attack, and 137,000 targets were hit by both kinds of attack.

Each day, three per cent of all registered Web domains are hosted on targeted IP addresses, the paper states, and over the two years, two-thirds of all Web sites were on IP addresses that were part of an attack.

It's no surprise that countries with the biggest presence on the Internet figure high as attack targets: America, China, France and Germany, for example. Russia is also a dangerous place.

The most popular protocols for a reflection attack are those that are most promiscuous in their responses: the Network Time Protocol (NTP) and the Domain Name System (DNS) make up more than 66 per cent of the data.

Third on the list is probably going to trigger nostalgia, though: CHARGEN responses were still seen in more than 22 per cent of reflected attacks. ®

Bootnote: Direct denial-of-service attacks are straightforward: attackers try to hose Google.com by overloading an IP address like 216.58.200.110 with traffic.

In “reflected” attacks, an IP spoofs that IP address, issuing requests to a huge number of other hosts so that responses to 216.58.200.110 over load it. Responses collected by CAIDA for this study included “TCP SYN/ACK, TCP RST, ICMP Echo Reply, ICMP Destination Unreachable, ICMP Source Quench, ICMP Redirect, ICMP Time Exceeded, ICMP Parameter Problem, ICMP Timestamp Reply, ICMP Information Reply, or ICMP Address Mask Reply”.

Similar topics

Broader topics


Other stories you might like

  • Minimal, systemd-free Alpine Linux releases version 3.16
    A widespread distro that many of its users don't even know they have

    Version 3.16.0 of Alpine Linux is out – one of the most significant of the many lightweight distros.

    Version 3.16.0 is worth a look, especially if you want to broaden your skills.

    Alpine is interesting because it's not just another me-too distro. It bucks a lot of the trends in modern Linux, and while it's not the easiest to set up, it's a great deal easier to get it working than it was a few releases ago.

    Continue reading
  • Verizon: Ransomware sees biggest jump in five years
    We're only here for DBIRs

    The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT environments and those hired by enterprises and security vendors to keep them out.

    Despite all that, Verizon's annual security breach report is again showing that there are constants in the field, including that ransomware continues to be a fast-growing threat and that the "human element" still plays a central role in most security breaches, whether it's through social engineering, bad decisions, or similar.

    According to the US carrier's 2022 Data Breach Investigations Report (DBIR) released this week [PDF], ransomware accounted for 25 percent of the observed security incidents that occurred between November 1, 2020, and October 31, 2021, and was present in 70 percent of all malware infections. Ransomware outbreaks increased 13 percent year-over-year, a larger increase than the previous five years combined.

    Continue reading
  • Slack-for-engineers Mattermost on open source and data sovereignty
    Control and access are becoming a hot button for orgs

    Interview "It's our data, it's our intellectual property. Being able to migrate it out those systems is near impossible... It was a real frustration for us."

    These were the words of communication and collaboration platform Mattermost's founder and CTO, Corey Hulen, speaking to The Register about open source, sovereignty and audio bridges.

    "Some of the history of Mattermost is exactly that problem," says Hulen of the issue of closed source software. "We were using proprietary tools – we were not a collaboration platform before, we were a games company before – [and] we were extremely frustrated because we couldn't get our intellectual property out of those systems..."

    Continue reading

Biting the hand that feeds IT © 1998–2022