13th Annual Worldwide Infrastructure Security Report Released
Tuesday 22nd January 2018 saw NETSCOUT release the 13th Annual Worldwide Infrastructure Security Report (WISR). This report is useful in many sectors and in fact, particularly more so to the service provider and so we have summarised below the findings of the report in the interest of our customer base.
The survey demographic is made up primarily of, Enterprise, Government, Education and Service Providers. At this time, there are still respondents without network or security expertise. The aim is to exclude as many of these respondents as possible in future to allow for accurate results, however, this issue would be difficult to eradicate entirely without stringent auditing.
The survey concluded that a common form of attack (DDOS) found to be most prevalent within the gaming communities, those looking to display their hacking prowess and those that would look to extort and benefit financially from personal/ business accounts. Furthermore, the survey found 57% of respondents from Enterprise, Government and Education sectors found that DDOS attacks compromised their bandwidth. This figure has increased 15% from the previous year.
While Enterprise, Government and Education sectors cumulatively made up 45% of respondents. The highest response came from Service Providers at 55% who were highly respondent to the survey. Once again, the most common form of intrusion reported was DDOS attacks. This threat is almost universal to the service provider. Power outages were also highly significant according to the report, with over 50% of service providers affected over the past year.
Perhaps in light of the above it should be of little surprise that 60% of Service Providers run their own Security Operations Centre or equivalent. A further 20% outsourced their Security operations either fully or to a certain degree. The figures in the table above go some way to explain why security has become a quintessential part of business – whether public/ private, small/ medium or enterprise. It would be of little surprise to these take up of security services rise once more with next year’s survey results.
As well as using standard/ mass DDOS attack methods, DNS (Domain Name Service) has been targeted by DDOS more frequently than before. Domain main name is the global system, which is constantly self-acting – translating Internet addresses, we type in to our search engines on a daily basis to the numeric machine addresses (IP’s) that computers/ servers and most devices now use. Over the past year, the report found that 25% of attacks using this method led to noticeable public outages. Considering the increased threat of DNS attacks, only ¼ of service providers have dedicated protections set up to prevent or deal with such attacks.
In a year that saw many high profile security incidents involving networks you would associate as having been very secure including the NHS, Equifax and Tesco Bank it perhaps doesn’t come at any surprise that figures are on the rise. 2017 was also a particularly important year in VooServers commitment to security achieving our ISO27001:2013 accreditation for information security management and some of the highest profile incidents of 2017 demonstrate that the most common problem is internal processes.