Surve. Incapsula Survey : What DDoS Attacks Really Cost Businesses. hat DDoS Att BY: TIM MATTHEWS. Incapsula, Inc. 2014 All Rights Reserved

Similar documents
Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

What SMBs Don t Know Can Hurt Them Perceptions vs. Reality in the New Cyber Threat Landscape

CHECKLIST: ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES

THE DANGER DEEPENS. Neustar Annual DDoS Attacks and Impact Report

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

The 2014 DDoS Attacks and Impact Report

VALIDATING DDoS THREAT PROTECTION

Survey: Endpoint Security Concerns 2014 The issues keeping IT admins awake into the New Year

Successfully Combating

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Securing Your Business with DNS Servers That Protect Themselves

TLP WHITE. Denial of service attacks: what you need to know

Securing Your Business with DNS Servers That Protect Themselves

How To Protect Yourself From A Dos/Ddos Attack

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

RETHINKING CYBER SECURITY

The Risk vs. Cost of Enterprise DDoS Protection

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail

Four Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers

Global IT Security Risks: 2012

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network?

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.

SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Eliminating Infrastructure Weaknesses with Vulnerability Management

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cloud Security In Your Contingency Plans

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Brainbench/ITAA Global Cyber Security Survey 2003

Making a Case for IPS

Impact of Data Breaches

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

SIPCOM Insight Guide. Keeping your workforce connected through the Cloud

Stop DDoS Attacks in Minutes

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Advanced Threat Protection with Dell SecureWorks Security Services

The Top 10 DDoS Attack Trends

Intelligent Infrastructure for Security

The Four-Step Guide to Understanding Cyber Risk

DDoS Basics. internet: unique numbers that identify areas and unique machines on the network.

Anti-exploit tools: The next wave of enterprise security

Automated Mitigation of the Largest and Smartest DDoS Attacks

20+ At risk and unready in an interconnected world

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Security survey in the United States

DDoS Attacks in the United Kingdom

Application Security Backgrounder

Yahoo Attack. Is DDoS a Real Problem?

Cyber Security Related Excerpts from the Global Risk Forum Berlin September 25-26, 2013 Draft 10/24/13

RETHINKING CYBER SECURITY

AUTOMATED PENETRATION TESTING PRODUCTS

Global Corporate IT Security Risks: 2013

In the Dark report, 2011

WHITE PAPER. Understanding How File Size Affects Malware Detection

How Effective CSOs Prepare for DDoS Attacks. Rob Kraus & Jeremy Scott Solutionary SERT

Executive Suite Series An Akamai White Paper

1. Thwart attacks on your network.

Free Guide: THE FACILITY MANAGER S DISASTER RECOVERY & RESPONSE ROADMAP

Securing Your Business with DNS Servers That Protect Themselves

Nine Steps to Smart Security for Small Businesses

Securing Your Business with DNS Servers That Protect Themselves

Category: Title of Nomination. Project Manager: Job Title: Agency: Department: Address: City: State:

DDoS Attacks Can Take Down Your Online Services

/ BROCHURE / AN E-GUIDE TO ONLINE SECURITY. By Melbourne IT Enterprise Services

UNDERSTANDING THE CAUSE AND EFFECT OF DDoS: How to mitigate risk and protect your financial institution

How To Protect Your Endpoints From Attack

Four Steps to Defeat a DDoS Attack

STEALTHWATCH MANAGEMENT CONSOLE

Global IT Security Risks

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

AUTOMATED PENETRATION TESTING PRODUCTS

Zoo Atlanta installs an IBM Proventia Network Multi-Function Security system to guard against Internet threats and spam.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

Networking for Caribbean Development

HOW ARE BANKS FIGHTING THE WAR ON FRAUD? To answer that question, Neustar asked the industry.

How To Mitigate A Ddos Attack

HIMSS Survey Uncovers Critical Weaknesses In Hospital Web Security

First Line of Defense

CYBER SECURITY: NAVIGATING THE THREAT LANDSCAPE

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

WHITE PAPER. Security Testing For Financial Institutions

/ BROCHURE / THE IMPORTANCE OF MULTI-LAYERED WEB SECURITY. By Melbourne IT Enterprise Services

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Security. 26 November 2012 Vol.18 No11

DDoS Attacks Advancing and Enduring: A SANS Survey

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Transcription:

hat DDoS Att Survey Incapsula Survey : What DDoS capsula Attacks Really Cost Businesses Surve BY: TIM MATTHEWS Incapsula, Inc. 2014 All Rights Reserved

ontents 1. Report Introduction... 01 2. Survey Methodology... 02 3. How Widespread are DDoS Attacks?... 03 4. Profile of an Attack... 04 5. Business Impact... 06 6. Mitigation and Preparedness... 08 7. Learning More/Getting Prepared... 09

1 Report Introduction The impact of distributed denial of service (DDoS) attacks gets bigger and harder to ignore every year; 2014 is certainly no exception. But while such assaults are on the rise, many companies have been content to protect themselves with antiquated firewall-based solutions. Instead they should be investing in solutions providing true protection against unscheduled downtime and financial losses. To determine real-world costs posed by DDoS attacks in 2014, Incapsula commissioned a survey to gauge real organizations experiences with them. By compiling these statistics, we hoped to provide some perspective. Additionally, we wanted to underscore the importance of investing in a truly impenetrable mitigation solution. Current DDoS trends make it clear that yesterday s strategy is no longer defensible. Large-scale volumetric attacks are growing in size, requiring increased network capacity in order to keep up. In addition, new and more sophisticated DDoS varieties are emerging, requiring organizations to be both highly flexible and ready for anything that might come their way. Entities continuing to rely on existing protection solutions or worse, no solution at all should reassess their position in light of this pervasive threat. 1

2 Survey Methodology Incapsula s survey data includes responses from 270 North American organizations. 1 These vary greatly in size from as few as 250 employees to 10,000 or more having a fairly even distribution between the two extremes. Reporting organizations are also functionally diverse. When asked to describe the industry in which they primarily operate, responses such as software/technology, manufacturing, and banking/finance were cited. Respondents hold a variety of positions, from system administration to web, network, security, and developer operations. About 80% of the participants reported their company is headquartered in the U.S. 1 The Incapsula DDoS Attacks survey took place between August 4 and August 9, with a total of 270 information technology (IT) professionals participating. The survey was fielded online, and conducted by the Cicero Group, an independent third party marketing research firm. All participants were selected at random, from a variety of industries, across the U.S. and Canada. The survey has a confidence interval of approximately +/- 5.96% at a 95% confidence level. The survey provides valuable insights regarding the actual costs of DDoS attacks; these may prove informative to any organization having previously ignored DDoS protection or which continues to rely on antiquated methodologies. The results are also useful in describing risks using common business terminology. 2

3 How Widespread are DDoS Attacks? DDoS assaults are common Almost half (45%) of the respondents indicated their organization had been hit at some point. Of these, almost all (91%) reported an attack during the last 12 months, and over two-thirds (70%) were targeted two or more times. somewhat familiar or very familiar. Further, their familiarity isn t merely based on theoretical knowledge many indicated they have direct experience dealing with DDoS incursions. While organizations of all sizes experience DDoS assaults, they are often worse for larger entities. Those having 500 or more employees are most likely to experience a DDoS assault, incur higher attack costs, and require more employees to combat the threat. The data reflect that most organizations have at least some familiarity with DDoS threats. When asked to rate their understanding of them, including what they are and how they work, 98% of the participants declared they were either 3

4 Profile of an Attack DDoS assaults come in many shapes and sizes, so organizations must be prepared for anything in order to protect themselves trend seems to point toward shorter durations, average attack lengths of days or even more than a week are also reported. Participants offered a wide range of answers regarding DDoS duration, whether perpetrators used a ransom note to extort money, and what the primary tactic of each incursion appeared to be. When asked how long an average assault lasts, they report a higher number of shorter attacks, with 86% reporting an average of 24 hours or less. However, upon closer examination, the data reveals there are no predictable patterns as to how long an assault will last. 37% of organizations reported an average of six hours or less, 31% cited 6 to 12 hours, and 18% claimed 13 to 24 hours. While the 4

Survey In part, NTP amplification attacks can be massive because the underlying UDP protocol does not require two-way handshaking. There seems to be no unified motive behind attacks, either. Respondents were evenly divided in answering whether they had ever received a ransom note from a DDoS perpetrator: 46% indicated they had, while 45% had not. This reveals an even mix of those motivated by financial gain and others who attack for different reasons. Here 40% of participants believe perpetrators were attempting to flood their organization s network, 25% surmised they were trying to cause an outage by targeting specific applications, and 33% believe both were the motivating factors. The tally shows that there is also a fairly even distribution of attack types used by offenders 5

5 Business Impact 49% of DDoS attacks last between 6-24 hours. This means that with an estimated cost of $40,000 per hour, the average DDoS cost can be assessed at about $500,000 with some running significantly higher. Costs are not limited to the IT group; they also have a large impact on units such as security and risk management, customer service, and sales. Additionally, most respondents who had been targeted experienced a variety of non-financial costs. 87% experienced at least one non-financial consequence, such as loss of customer trust, loss of intellectual property, and virus/malware infection, while 60% incurred two or more. 52% had to replace hardware or software, 50% had a virus or malware installed/activated on their network, and 43% experienced loss of consumer trust. Furthermore, 33% acknowledged customer data theft, and 19% suffered intellectual property loss. 6

Survey There is much more than meets the eye in relation to DDoS dangers and costs. This is illustrated by participants answers when asked to describe which operational area takes the largest financial hit during an assault. As you might expect, at 35% IT was the most-cited answer. However, responses were fairly distributed among all options, with 23% naming sales, 22% identifying security and risk management, and 12% citing customer services. Marketing and legal were also listed, revealing that very few departments are completely safe from DDoS carnage. Recovering from attack damage can also take months or years. Over half of the respondents (52%) reported their organization had to replace software/hardware, or that it had lost revenue. An additional 43% confirmed that their organization lost consumer trust. Each example reveals DDoS aftermath to be long-term. 7

6 Mitigation and Preparedness Many of those surveyed work for organizations lacking an effective plan to prepare for, and mitigate, targeted DDoS penetrations. When participants were asked to describe how many people are typically involved in mitigating an incursion, the numbers tend to be higher. 27% reported their organization used 15 or more people, while no one works for an entity where its response could be managed by a single person These numbers emphatically demonstrate there is room for improvement when it comes to efficiently thwarting DDoS attacks. Ideally, an organization should be able to quickly respond with as few employees as possible. Statistics regarding measures taken to protect themselves are equally discouraging. Over half of all respondents acknowledge that their firm continues to rely on web application firewalls or traditional network firewalls partial solutions that are vulnerable on their own. A respectable 43% reported that their organization uses a purpose-built DDoS protection solution. This is a good sign. Ideally, however, all organizations should avail themselves of the latest mitigation technologies. These provide a level of defense that traditional firewalls can never match. 8

7 Learning More/Getting Prepared Our 2014 DDoS Impact Report data demonstrate an alarming trend intrusions are becoming more prevalent, more sophisticated, and more costly. At the same time, many organizations aren t taking appropriate measures to protect themselves. The survey reveals that many organizations continue to haphazardly respond to attacks, relying on the same firewall solutions they ve been using for years. In today s world, where DDoS attacks are increasingly common and can easily cost an organization hundreds of thousands of dollars, this is no longer tenable. If you want to be more proactive about combating DDoS attacks, then the data from this survey will help you to convince your CEO/ CTO/CFO that steps need to be taken. After all, the numbers don t lie. To learn what your company should do next, download our free DDoS Response Playbook. 9

Try a Two-Week Free Trial»» No software to download or equipment to hook up»» Getting started is easy and requires only a DNS change»» Includes load-balancing and web application acceleration Get Started Today Questions? Contact us.