{"id":8714,"date":"2019-05-15T03:59:28","date_gmt":"2019-05-15T03:59:28","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=8714"},"modified":"2026-04-17T18:07:53","modified_gmt":"2026-04-17T18:07:53","slug":"2018-ddos-attack-landscape-6","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/2018-ddos-attack-landscape-6\/","title":{"rendered":"2018 DDoS Attack Landscape-6"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>3.4&Acirc;&nbsp; Behavioral Analysis of Attack Sources<\/strong><\/h2>\n<p>In the 2018 H1 Cybersecurity Insights8, we mentioned that the number of DDoS recidivists (repeat DDoS offenders) was too large to ignore. Of all internet attack types, 25% of attackers were recidivists responsible for 40% of all attack events. As for DDoS attacks, 7% of attackers were recidivists that launched 12% of attack events. (Here, &#8220;DDoS recidivists&#8221; refer to source IP addresses that have been marked by NSFOCUS Threat Intelligence center (NTI) as DDoS attack sources.) Clearly, in DDoS attacks, the proportion of recidivists decreased in 2018, indicating a lower level of resource reuse. This can be attributed to two factors:<!--more--><\/p>\n<p>(1) There are large quantities of attack resources publicly available via the Internet, and attackers can easily obtain such resources through repeated scanning, making it unnecessary to retain attack resources for a long time. Most recidivists are long-lasting harmful resources on the Internet that are very easy to leverage for attackers around the world.<\/p>\n<p>(2) DDoS attacks are typically the last step to complete the kill chain. When hosts\/devices are leveraged to conduct DDoS attacks, maintenance personnel can easily spot them and promptly fix the problem. Therefore, a large proportion of bot hosts previously used in a DDoS attack will be abandoned later, making it necessary for hackers to rescan and infect hosts to expand the botnet size.<\/p>\n<p>Furthermore, we notice that, regardless of the attack type, the proportion of attacks initiated by recidivists is often twice that of number of recidivists themselves. Recidivists should be considered quite threatening, and their activities should be closely monitored.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-8715\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"571\" height=\"327\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-1.jpg 571w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-1-300x172.jpg 300w\" sizes=\"(max-width: 571px) 100vw, 571px\" \/><\/a><\/p>\n<h3><strong>3.4.1&Acirc;&nbsp; Anomalous Behavior<\/strong><\/h3>\n<p>Attack resources used in DDoS attacks are typically involved in only one attack type. Among all DDoS sources, 89% have conducted only one type of anomalous activity and only a small proportion are found to have engaged in several (up to six) types of anomalous activity.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8716\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"557\" height=\"284\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-2.jpg 557w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-2-300x153.jpg 300w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><\/a><\/p>\n<p>As shown in Figure 3.20, 41% of attack sources were controlled botnets; 18% have conducted scanning, which is the preparation step for subsequent intrusions by collecting system information and vulnerability information of target machines; another 18% were marked by NTI as to have repeatedly conducted DDoS attacks because they contain vulnerabilities that can be remotely controlled and were left unfixed, or because they have reflection capability.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8717\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"596\" height=\"327\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-3.jpg 596w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-3-300x165.jpg 300w\" sizes=\"(max-width: 596px) 100vw, 596px\" \/><\/a><\/p>\n<h3><strong>3.4.2&Acirc;&nbsp; Activity<\/strong><\/h3>\n<p>From monitoring of attack source activity, we see 10 days is a clear-cut divide for activity. Specifically, the proportion of attack sources active for less than 10 days is 98%, and that of attack sources active for more than 10 days (up to 280 days) is 2%. 95% of attack sources remain active for 1&acirc;&euro;&ldquo;5 days. This infers that in order to keep attack resources viable and prevent them from being blacklisted by defenders, attackers tend to use the hit-and-run strategy, specializing in multiple short attacks. Also suggested is that there are a wide range of vulnerable IP addresses on the Internet, making it easy for attackers to obtain such resources at a very low cost.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8718\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"588\" height=\"313\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-4.jpg 588w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-4-300x160.jpg 300w\" sizes=\"(max-width: 588px) 100vw, 588px\" \/><\/a><\/p>\n<h3><strong>3.4.3&Acirc;&nbsp; Geographic Distribution<\/strong><\/h3>\n<p>According to distribution of activity time of attack source IP addresses, attack sources active for over 10 days are regarded as highly desirable. They often contain an obvious security risk which is easily exploited, thus posing greater threats.<\/p>\n<p>Globally, highly active attack sources are mostly distributed in China, the USA, and Russia. In China, they are mostly in coastal provinces and economically developed regions, such as Guangdong, Jiangsu, and Beijing. With a larger network infrastructure than other regions, even with similar protections, networks in these regions are more vulnerable than in other regions due to a much greater number of potentially vulnerable devices.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8719\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-5.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"573\" height=\"585\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-5.jpg 573w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-5-294x300.jpg 294w\" sizes=\"(max-width: 573px) 100vw, 573px\" \/><\/a><\/p>\n<h3><strong>3.4.4&Acirc;&nbsp; IP Chain-Gang Behavior<\/strong><\/h3>\n<p>IP Chain-Gang attacks refer to the large-scale attacks launched using certain attack methods through relatively monopolized attack resources. Unlike common attack events initiated by a single attacker, IP Chain-Gangs typically pursue intelligence and economic targets. Therefore, NSFOCUS feels that research into attack gang behavior based on their attack characteristics and history will be useful in predicting future IP Chain-Gang behavior. In the report, Behavior Analysis of IP Chain-Gangs9, recently released by NSFOCUS, we introduce the concept of modeling gang behavior based on gang size, attack traffic, attack count, and victims.<\/p>\n<p><strong>IP Chain-Gang Size<\/strong><br \/>\nAccording to the overall distribution of gang sizes, most IP Chain-Gangs have less than 1000 members, except for one gang which has over 26,000 members.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8720\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-6.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"577\" height=\"256\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-6.jpg 577w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-6-300x133.jpg 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/><\/a><\/p>\n<p>Figure 3.24 shows the size distribution of the IP Chain-Gangs identified by NSFOCUS. Each point represents a gang, with a total of 82 gangs found to date.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8721\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-7.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"620\" height=\"310\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-7.jpg 620w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-7-300x150.jpg 300w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/a><\/p>\n<p><strong>Total Attack Volume<\/strong><\/p>\n<p>The total attack volume of each gang includes the traffic generated by all attacks launched by each member. Though the total attack volume varies, the total attack volume of most IP Chain-Gangs has exceeded 50 Tbps.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8722\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-8.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"572\" height=\"281\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-8.jpg 572w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-8-300x147.jpg 300w\" sizes=\"(max-width: 572px) 100vw, 572px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8723\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-9.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"584\" height=\"293\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-9.jpg 584w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-9-300x151.jpg 300w\" sizes=\"(max-width: 584px) 100vw, 584px\" \/><\/a><\/p>\n<p><strong>Attack Count<\/strong><\/p>\n<p>As shown in Figure 3.27, the number of attacks launched by each member of nearly 60 IP Chain-Gangs was less than 5000. It was somewhat surprising that 80% of all attacks were launched by only 20% of gangs.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8724\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-10.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"561\" height=\"332\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-10.jpg 561w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0515-10-300x178.jpg 300w\" sizes=\"(max-width: 561px) 100vw, 561px\" \/><\/a><\/p>\n<p>to be continued<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>3.4&Acirc;&nbsp; Behavioral Analysis of Attack Sources In the 2018 H1 Cybersecurity Insights8, we mentioned that the number of DDoS recidivists (repeat DDoS offenders) was too large to ignore. Of all internet attack types, 25% of attackers were recidivists responsible for 40% of all attack events. As for DDoS attacks, 7% of attackers were recidivists that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8449,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,15],"tags":[372],"class_list":["post-8714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-research-reports","tag-ddos-attack"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2018 DDoS Attack Landscape-6 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2018 DDoS Attack Landscape-6 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"3.4&Acirc;&nbsp; Behavioral Analysis of Attack Sources In the 2018 H1 Cybersecurity Insights8, we mentioned that the number of DDoS recidivists (repeat\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-15T03:59:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/DDoS-Attack-Landscape2018.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"2018 DDoS Attack Landscape-6 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"3.4&Acirc;&nbsp; Behavioral Analysis of Attack Sources In the 2018 H1 Cybersecurity Insights8, we mentioned that the number of DDoS recidivists (repeat\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/DDoS-Attack-Landscape2018.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"2018 DDoS Attack Landscape-6\",\"datePublished\":\"2019-05-15T03:59:28+00:00\",\"dateModified\":\"2026-04-17T18:07:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/\"},\"wordCount\":813,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/DDoS-Attack-Landscape2018.jpg\",\"keywords\":[\"DDoS attack\"],\"articleSection\":[\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/\",\"name\":\"2018 DDoS Attack Landscape-6 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/DDoS-Attack-Landscape2018.jpg\",\"datePublished\":\"2019-05-15T03:59:28+00:00\",\"dateModified\":\"2026-04-17T18:07:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/DDoS-Attack-Landscape2018.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/DDoS-Attack-Landscape2018.jpg\",\"width\":749,\"height\":317,\"caption\":\"DDOS attack landscape graphic with green background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2018-ddos-attack-landscape-6\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2018 DDoS Attack Landscape-6\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2018 DDoS Attack Landscape-6 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"2018 DDoS Attack Landscape-6 - NSFOCUS","og_description":"3.4&Acirc;&nbsp; Behavioral Analysis of Attack Sources In the 2018 H1 Cybersecurity Insights8, we mentioned that the number of DDoS recidivists (repeat","og_url":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/","og_site_name":"NSFOCUS","article_published_time":"2019-05-15T03:59:28+00:00","article_modified_time":"2026-04-17T18:07:53+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/DDoS-Attack-Landscape2018.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"2018 DDoS Attack Landscape-6 - NSFOCUS","twitter_description":"3.4&Acirc;&nbsp; Behavioral Analysis of Attack Sources In the 2018 H1 Cybersecurity Insights8, we mentioned that the number of DDoS recidivists (repeat","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/DDoS-Attack-Landscape2018.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"2018 DDoS Attack Landscape-6","datePublished":"2019-05-15T03:59:28+00:00","dateModified":"2026-04-17T18:07:53+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/"},"wordCount":813,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/DDoS-Attack-Landscape2018.jpg","keywords":["DDoS attack"],"articleSection":["DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/","url":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/","name":"2018 DDoS Attack Landscape-6 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/DDoS-Attack-Landscape2018.jpg","datePublished":"2019-05-15T03:59:28+00:00","dateModified":"2026-04-17T18:07:53+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/DDoS-Attack-Landscape2018.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/DDoS-Attack-Landscape2018.jpg","width":749,"height":317,"caption":"DDOS attack landscape graphic with green background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/2018-ddos-attack-landscape-6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"2018 DDoS Attack Landscape-6"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8714"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8714\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8449"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}