

The most significant, back in 2007, saw a botnet containing roughly 5,000 computers swamp four root servers with traffic, taking down two of them for several hours in two waves of attacks. This was only the third time that root servers have been targeted in a significant sustained attack. We were introduced to the massive 40Gbps Root DNS attack on Turkish servers executed by Anonymous. Struck with multiple methods, the attack lasted on and off for two days and at its peak, it reached 80 Gbps of traffic.Ģ.

ProtonMail experienced one of the biggest combined attacks recorded this year. The most common attack in 2015 was the combined attack. These services use multi-vector attacks to exhaust as many defense mechanism as they can and the decreasing cost of these services is also making it much more affordable to bring down websites. “Booters” and “Stressers” are DDoS services available on the web or dark-net and they can make attacks accessible to an attacker without the attacker having to build a botnet or buy one. The generation of a large volume of traffic indicates a clear purpose by attackers to cause a denial of service attack to the targeted victim by any means. The combined attacks they experienced involved UDP floods, SYN floods, DNS reflection, ICMP floods and TCP out-of-sequence floods.

The ones studied by Radware researchers were often volumetric however, sophisticated, combined attacks such as Proton Mail were also fought by the Radware Emergency Response Team (ERT). There were no “common” DDoS attacks in 2015.
