2019 DDoS攻击态势报告 M IC DDoS Attack Landscape P d oo Fl SY N T HT d oo Fl oo Fl PS d } ] = ; > L / ? ; O 9 ( 8 * : P 0 ) “ [ sh ift { 防 R 御 et ur n \ D el et e i g + d oo d Fl oo P Fl UD K AC u th 5 b m o .c 关于中国电信云堤 2008 年以来,中国电信开始着力于网络 DDoS 攻击防护能力建设,已形成了覆盖国内 31 省 和亚太、欧洲、北美等主要 POP 点一体化攻击防御能力。2014 年,中国电信首次在业界系统性 提出电信级网络集约化安全能力开放平台框架,并将“云堤”作为对外服务的统一品牌。 “保障网络安全、提供一流服务”,中国电信除了持续加强高效、可靠、精确、可开放的 DDoS 攻击防护能力建设外,继续加大网络资源和能力的开放力度,陆续推出网站安全、域名安全、 反欺诈和 APP 合法合规等产品。目前已为政务、金融、教育、医疗、互联网、能源制造等数千家 行业客户提供运营商级网络安全服务。 关于绿盟科技 i g u th 5 b 北京神州绿盟信息安全科技股份有限公司(以下简称绿盟科技公司),成立于 2000 年 4 月, 总部位于北京。公司于 2014 年 1 月 29 日在深圳证券交易所创业板上市,证券代码:300369。 绿盟科技在国内设有 40 多个分支机构,为政府、运营商、金融、能源、互联网以及教育、医疗 等行业用户,提供全线网络安全产品、全方位安全解决方案和体系化安全运营服务。公司在美国 硅谷、日本东京、英国伦敦、新加坡设立海外子公司,深入开展全球业务,打造全球网络安全行 业的中国品牌。 版权声明 本文中出现的任何文字叙述、文档格式、插图、照片、方法、过程等内容,除另有特别注 明,版权均属绿盟科技所有,受到有关产权及版权法保护。任何个人、机构未经绿盟科技的书 面授权许可,不得以任何方式复制或引用本文的任何片断。 m o .c 2019 DDoS 攻击态势报告 目录 1. 执行摘要 ·······························································································································································2 2. 2019 年 DDoS 攻击态势概览·······························································································································4 2.1 2019 vs 2018 ··············································································································································································· 5 2.2 重要观点······················································································································································································· 5 3. 2019 年 DDoS 攻击分析 ······································································································································6 3.1 DDoS 攻击次数和流量峰值情况 ··············································································································································· 7 m o .c 3.1.1 攻击峰值分布 ······························································································································································································ 7 3.1.2 DDoS 攻击次数和攻击流量······································································································································································· 9 3.1.3 单次攻击最高和平均峰值 ·······································································································································································11 3.2 DDoS 攻击类型分析 ································································································································································· 12 5 b 3.2.1 攻击类型占比 ····························································································································································································12 3.2.2 攻击类型各流量区间分布 ·······································································································································································16 3.2.3 反射攻击 ····································································································································································································17 u th 3.3 DDoS 攻击时间刻画 ································································································································································· 18 3.3.1 DDoS 攻击持续时间占比 ·········································································································································································18 3.3.2 一天中 DDoS 攻击活动分布····································································································································································18 i g 3.3.3 一周中 DDoS 攻击活动分布 ···································································································································································19 3.4 DDoS 攻击地域分布 ································································································································································· 20 3.4.1 DDoS 受控攻击源地域分布··················································································································································

pdf文档 绿盟 2019 DDoS 攻击态势报告

文档预览
中文文档 47 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共47页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
绿盟 2019 DDoS 攻击态势报告 第 1 页 绿盟 2019 DDoS 攻击态势报告 第 2 页 绿盟 2019 DDoS 攻击态势报告 第 3 页
下载文档到电脑,方便使用
本文档由 路人甲 于 2022-07-17 01:17:25上传分享
加微信群 有优惠
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。