Attackers Vs. Defenders: Restoring the Equilibrium. Ron Meyran Director of Security Marketing January 2013. AGENDA. Cyber security Statistics About 2012 Global Security Report Key Findings ERT Case Studies 2013 Recommendations. Cyber Security Study.
Director of Security Marketing
A research study by Ponemon & Radware
Surveyed 700 IT & IT Security Practitioners
Non Radware customers
Release date: November 12th 2012
Ranking of cyber security objectives in terms of a business priority objective
5 = Highest Priority to 1 = Lowest Priority
How many DDoS attacks experienced in the past 12 months?
of organizations had an average of 3 DDoS attacks in the past 12 months
Minutes average downtime during one DDoS attack
Cost per minute of downtime
Average cost per minute of downtime
Average annual Cost of DDoS Attacks
ERT gets to see attacks in real-time on daily basis
They had the budget
They made the investment
And yet they went offline
Industry Security SurveyHow much did your organization invest in each of the following security aspects in the last year?
Only 21% of company efforts are invested during the attack itself,
while 79% is spent during the pre-attack and post-attack phase.
Attacks last longer: The number of DoS attacks lasting over a week had doubled in 2012
ERT Cases – Attack Vectors
Attacks are more complex: 2012 DoS/DDoS attacks have become more sophisticated, using morecomplex attack vectors. Note the number of attacks using a complexity level of 7-10.
Do you consider Content Delivery Networks (CDNs)a solution for a DoS/DDoS attack?
70% of the companies who use CDN believe the CDN is a solution for DoS\DDoS attacks.
InternetAttacks Evade CDN service
By definition the defenders loose the battle
Equilibrium has been disrupted
Industry Security SurveyHow likely is it that your organization will be attacked by cyber warfare?
Organizations start understanding the risk of DDoS
Over half of the organizations believe their organization is likely
to be attacked by cyber warfare.
Industry Security SurveyWhich solutions do you use against DoS attacks?
Organizations start understanding Firewall and IPS cannot fight DDoS attacks
Publication of the ‘Innocence of Muslim’ film on YouTube invokes demonstrations throughout the Muslim world
September 18th- ‘Cyber Fighters of Izz ad-din Al Qassam’ announced an upcoming cyber attack campaign against ‘American and Zionist’ targets.
UDP Garbage flood on ports 80 and 443
Large volume SYN flood
SSL Client Hello flood
HTTP flood attack
Restore the equilibrium