i g u th 5 b m o .c © 中国电信云堤 & 绿盟科技 关于中国电信云堤 2008 年以来,中国电信开始着力于网络 DDoS 攻击防护能力建设,已 形成了覆盖国内 31 省和亚太、欧洲、北美等主要 POP 点的一体化攻击防 御能力。2014 年,中国电信首次在业界系统性提出电信级网络集约化安全 能力开放平台框架,并将“云堤”作为对外服务的统一品牌。 几年来,中国电信云堤一方面致力于高效、可靠、精确、可开放的 DDoS 攻击防护能力建设,同时,面向政企客户提供运营商级 DDoS 攻击防 护服务。目前已涵盖互联网、金融、能源制造、政府机构等各个行业。 关于绿盟科技 u th i g 北京神州绿盟信息安全科技股份有限公司(以下简称绿盟科技),成 立于 2000 年 4 月,总部位于北京。在国内外设有 40 多个分支机构,为政府、 运营商、金融、能源、互联网以及教育、医疗等行业用户,提供具有核心 竞争力的安全产品及解决方案,帮助客户实现业务的安全顺畅运行。 基于多年的安全攻防研究,绿盟科技在检测防御类、安全评估类、安 全平台类、远程安全运维服务、安全 SaaS 服务等领域,为客户提供入侵检 测 / 防护、抗拒绝服务攻击、远程安全评估以及 Web 安全防护等产品以及 安全运营等专业安全服务。 北 京 神 州 绿 盟 信 息 安 全 科 技 股 份 有 限 公 司 于 2014 年 1 月 29 日 起 在深圳证券交易所创业板上市交易,股票简称:绿盟科技,股票代码: 300369。 5 b m o .c 2018 DDoS 攻击态势报告 目录 1. 执行摘要 ·······························································································································································1 2. 2018 年 DDoS 攻击态势概览·······························································································································3 2.1 2018 vs. 2017 ············································································································································································· 4 2.2 重要观点······················································································································································································ 5 3. 2018 年 DDoS 攻击分析 ······································································································································6 m o .c 3.1 DDoS 攻击次数和流量峰值情况 ·············································································································································· 7 3.1.1 DDoS 攻击次数和攻击流量······································································································································································ 7 3.1.2 攻击峰值分布 ····························································································································································································· 9 3.1.3 单次攻击最高和平均峰值·······································································································································································11 5 b 3.2 DDoS 攻击类型分析 ································································································································································ 12 3.2.1 攻击类型占比 ···························································································································································································12 3.2.2 攻击类型各流量区间分布·······································································································································································14 u th 3.2.3 反射攻击 ···································································································································································································15 3.3 DDoS 攻击时间········································································································································································· 18 3.3.1 DDoS 攻击持续时间占比 ········································································································································································18 i g 3.3.2 DDoS 攻击时间画像 ················································································································································································19 3.3.3 一天中 DDoS 攻击活动分布···································································································································································19 3.3.4 一周中 DDoS 攻击活动分布···································································································································································20 3.4 攻击资源行为分析 ··································································································································································· 20 3.4.1 攻击资源异常行为类型分析 ··································································································································································21 3.4.2 攻击资源活跃度分析···············································

pdf文档 绿盟 2018DDoS攻击态势报告

文档预览
中文文档 46 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共46页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
绿盟 2018DDoS攻击态势报告 第 1 页 绿盟 2018DDoS攻击态势报告 第 2 页 绿盟 2018DDoS攻击态势报告 第 3 页
下载文档到电脑,方便使用
本文档由 路人甲 于 2022-07-17 01:17:09上传分享
加微信群 有优惠
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。