DDOS attacks in Australia are shorter in duration that in other countries but still just as dangerous, according to new data from Arbor Networks. The average attack length was 22 minutes in Australia compared to 46 minutes across Asia Pacific during the first quarter of 2015. However, the average size attack over the period was 1.25Gbps, twice as big as the average attack in the region. Arbor said it has documented a dramatic increase in DDOS attack size and activity in the past year. The majority of these attacks use a reflection amplification technique using the network time protocol (NTP), simple service discovery protocol (SSDP), and DNS servers, with large numbers of attacks being detected around the world. SSDP topped the list of reflection attacks in the first quarter with the largest reported at 26Gbps while the largest NTP reflection attack was 51Gbps. Reflection amplification is a technique that allows an attacker to magnify the amount of traffic they generate, and obfuscate the original sources of that attack traffic. This technique relies on two unfortunate realities, Arbor said. Firstly, around half of the service providers do not implement filters at the edge of their network to block traffic with a forged (spoofed) source IP address. Secondly, there are plenty of poorly configured and poorly protected devices on the Internet providing UDP services that offer an amplification factor between a query sent to them and the response which is generated, Arbor said. Nick Race, Australia country manager for Arbor Networks said short bursts of DDoS activity required automated defences to protect against them. “Operators in Australia absolutely should take note,” he said. “On-premise DDoS protection is essential for both detection and mitigation of attacks, enabling bad traffic to be scrubbed in an immediate and automated fashion,” he said. Follow CIO Australia on Twitter and Like us on Facebook… Twitter: @CIO_Australia, Facebook: CIO Australia, or take part in the CIO conversation on LinkedIn: CIO Australia Follow Byron Connolly on Twitter:@ByronConnolly Related content feature Key IT initiatives reshape the CIO agenda While cloud, cybersecurity, and analytics remain top of mind for IT leaders, a shift toward delivering business value is altering how CIOs approach key priorities, pushing transformative projects to the next phase. By Mary Pratt May 30, 2023 10 mins IT Strategy IT Leadership opinion Managing IT right starts with rightsizing IT for value While there are few universals when it comes to saying unambiguously what ‘managing IT right’ looks like, knowing how to navigate the limitless possibilities of IT is surely one. By Thornton May May 30, 2023 6 mins Digital Transformation IT Strategy IT Leadership analysis 5 domande difficili alle quali ogni leader IT dovrebbe rispondere Una leadership forte è fondamentale per il successo dell’IT e ciò non andrebbe mai dato per scontato. Al contrario, un’auto-riflessione continua, da parte degli interessati, è essenziale per capire se è giunto By Thornton May May 29, 2023 6 mins IT Leadership feature Red Hat embraces hybrid cloud for internal IT The maker of OpenShift has leveraged its own open container offering to migrate business-critical apps to AWS as part of a strategy to move beyond facilitating hybrid cloud for others and capitalize on the model for itself. By Paula Rooney May 29, 2023 5 mins CIO 100 Technology Industry Hybrid Cloud Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe