DDoS Attacks Use Globally Distributed Weapons

Description Text 

DDoS attacks are growing in frequency, intensity and sophistication, but their delivery methods are unchanged. Infected internet bots and vulnerable servers continue to create attacks of crushing scale against unprepared targets. These bots are the weapons used repeatedly in multiple DDoS attacks. A global distribution of these internet zombies sits idle, waiting to be called into action.

WHAT IS THREAT INTELLIGENCE?

Description Text 

“Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard.” - Gartner

Security researchers accumulate threat intelligence from tens of millions of internet bots that are vulnerable and exploited as DDoS attack weapons. DDoS Threat Intelligence is the information gleaned from the repeated use of attacking agents combined with the knowledge of vulnerable IP addresses and host. This information provides security researchers the ability to proactively improve DDoS defenses.

WHAT ARE DDOS ATTACK AGENTS?

Cybercriminals leverage internet zombies as DDoS attack weapons. The global distribution of these weapons sit at the ready, waiting to be called into action. Unlike traditional security attack strategies that use stealth and obfuscation to avoid detection, DDoS attacks are loud and easily identified.

HTML/CSS 

IMPORTANT FACTS ABOUT DDOS ATTACKS

Billions of dollars
are lost each year by organizations due to DDoS attacks
Tens of millions
of malicious objects have been identified, and the number keeps growing
20-50 billion
connected devices by 2020, nearly 3.5x more than in 2014
$10/hour
is all it costs a cyber-criminal to create a DDoS attack

DDOS THREAT INTELLIGENCE SERVICE BENEFITS

SAVE TIME

SAVE TIME

Reduce your response time with known DDoS weapons including vulnerable amplification reflectors and internet bots
INSTANTLY BLOCK ATTACKERS

INSTANTLY BLOCK ATTACKERS

Prevent downtime with a proactive approach to DDoS defenses that applies current and up-to-date threat intelligence
SAVE MONEY

SAVE MONEY

Included with Thunder TPS is DDoS Threat Intelligence from over 60 security intelligence sources, powered by ThreatStop and made actionable by A10 Networks

Top 3 Ways to Make DDoS Threat Intelligence into an Actionable Defense

Description Text 

DDoS Threat Intelligence includes tens of millions of internet bots that may be used as weapons. The challenge is converting the voluminous amount of threat intelligence into an actionable defense strategy. Here are three ways you can take action and build a DDoS defense using A10’s Threat Intelligence service.

DDoS Threat Intelligence Map

Visualize the global landscape of DDoS weapons in real-time

1. Blacklist Servers Vulnerable to Reflected Amplification

Description Text 

They are vulnerable to UDP-based reflective amplification exploitation before they flood your network with unwanted traffic.

HTML/CSS 

Continuously Update with Newly Found and
Deprecated Open Server IP Addresses

Memcached

~105 thousand

DNS

~3.5 million

NTP

~3.5 million

SSDP

~4.5 million

SNMP

~5.5 million

HTML/CSS 

Continuously updated with newly found and deprecated drone IP addresses

DDoS Critical

~1M records, active in past 24 hours

DDoS Drones

~1M records, e.g. Mirai, Reaper and other known DDoS Botnets

2. Block Infected Internet Bots

Description Text 

These toxic DDoS bots IP addresses can do damage against your infrastructure and critical applications that your business depends upon.

3. USE LARGE LISTS OF KNOWN OBJECTS

Description Text 

The A10 Thunder TPS supports the largest list of DDoS Threat Intelligence. Class-lists can be updated every 15 minutes to keep your defenses current and accurate in real-time. Nearly 100 million objects of both trusted and malicious agents have been identified. This gives you surgical precision to keep your network running optimally.

HTML/CSS 

Class-list capacity

vThunder TPS

Up to 24 million

Thunder TPS 1040

Up to 8 million

Thunder TPS 3030

Up to 24 million

Thunder TPS 4435

Up to 48 million

Thunder TPS 5435

Up to 96 million

Thunder TPS 6435

Up to 96 million

Thunder TPS 14045

Up to 96 million

HTML/CSS 

We’re tracking the rapid expansion of IoT botnets, and the continued use of UDP reflection attacks. DDoS is a problem that keeps growing in size and strength, and the number of attacks on businesses is nearly double that of a year ago. Denial of Service attacks aren’t limited to certain company types anymore – and we predict 2018 will be the year every company realizes they could be a target.”

How Do I Get DDoS Threat Intelligence?

Description Text 

A10’s Thunder TPS products include a DDoS Threat Intelligence service. Unlike legacy DDoS defenses that only support thousands of entries, A10’s Thunder TPS product includes class-lists of millions dynamically updated for actionable defense strategies. A10’s research combined with Threat Intelligence from ThreatSTOP includes IP addresses of reflection attack weapons and globally distributed botnets actively in use DDoS attacks within the last 24 hours.

existing Thunder TPS customers

Activate your free Threat Intelligence service.

new customers

Interested in the A10 Thunder TPS with DDoS Threat Intelligence?