Posted by: RAH Infotech | January 27, 2016

Radware’s 2015/2016 Global Application and Network Security Report Predicts 2016 Will Bring ‘The Battle of The Bots’

Report Reveals 2015 Attack Trends and Market Predictions for 2016, Including Increase in Bot Automation, Ransom Attacks, DDoS Frequency and Volume


Radware® a leading provider of cyber security and application delivery solutions ensuring optimal service level for applications in virtual, cloud and software defined data centers, announced the release of its Global Application and Network Security Report 2015-2016.

The annual report identifies the major attack trends of 2015, outlines industry preparedness, and offers predictions for 2016.  Radware found that throughout 2015, no industry was immune to cyber attacks, and few were prepared. In 2016, attacks are predicted to become even more aggressive with the arrival of Advanced Persistent Denial of Service (APDoS) attacks and an increase in volume and scope of sophisticated bot-generated attacks against web application infrastructure.

Radware’s Emergency Response Team (ERT), which actively monitors and mitigates attacks in real-time, creates this annual report for use by the security community, drawing from their in-the-trenches experiences fighting cyber-attacks and the perspectives of third-party service providers. The report was compiled using a combination of data from a vendor neutral survey of more than 300 organizations and the expertise of the Emergency Response Team to provide the industry with insights and best practices to help prepare for 2016’s security landscape.

Key findings from the report include:

  • Increase in Frequency of Ransoms: Attackers focus their Ransom demands toward service providers and leverage both DDoS and SSL Flood attacks when payment is not made.
  • Wider and More Sophisticated Attack Modalities:  Attacks are becoming completely automated and more sophisticated each day.  New techniques like Burst Attacks, Advanced Persistent Denial of Service (APDoS), increase in volumetric pipe attacks, and Dynamic IP Attacks make it harder to defend against mostly manual solutions.
  • Increased Attacks on Education and Hosting Industries. In 2015, several verticals faced consistent levels of threat, while both Education and Hosting moved from “Medium” to “High” risk on Radware’s Ring of Fire map. Organizations in these verticals are more likely to experience DoS/DDoS and other cyber-attacks and to experience such attacks at a higher frequency than in the previous year.
  • A Growing Need for Security Automation.  With a rise in APDoS and other volumetric pipe attacks, including  the mimicking of user behavior and serving up dynamic IP addresses, there is an emerging threat that demands more advanced detection and mitigation,
  • Over 90% Experienced Attacks in 2015. More than 90% of organizations reported experiencing attacks in 2015. Only one in 10 had not experienced any of the attacks covered in the report.
  • The Enterprise is Still Not Prepared for Cyber-Attacks. While more than 60% are extremely/very well prepared to safeguard against unauthorized access and worm and virus damage, the same proportion of respondents indicated somewhat/not very prepared against advanced persistent threats (APT) and information theft. For distributed denial of service (DDoS), results split almost evenly between prepared and not prepared to protect against such attacks.
  • Protection Gaps Were Identified Across the Board. One-third of respondents cited a volumetric/pipe saturation weakness, and another quarter cited vulnerability to network and HTTPS/SSL attacks. Overall weaknesses are spread fairly evenly, suggesting a true protection gap for most organizations today

Radware’s ERT recommendations include the following steps to anticipate and mitigate attacks:

  • Bet on Bots and Automation. It is no longer realistic to believe humans can deploy detection technologies and choreograph threat responses in real time. Rather, it has become necessary to fight automated threats with automation technology.
  • Cover the Blind Spot. To target an organization’s blind spot, attackers deploy parallel, multi-vector attack campaigns by increasing the number of attack vectors launched in parallel and targeting different layers of the network and data center. If only one vector goes undetected, the attack is successful and the result is highly destructive.
  • Mitigate All Types of DDoS Attacks. Organizations need a single vendor, hybrid solution that can protect networks and applications for a wide range of attacks. A truly integrated solution includes all the different technologies needed, including DoS protection, behavioral analysis, IPS, encrypted attack protection and web application firewall (WAF).
  • Understand the Likelihood and Cause of Attacks. Mitigation assumptions should move in lockstep with risk level. Whether it’s preparing for increased industry risk or being mindful to how hacktivists operate and select targets, understanding fuels preparation to mitigate risks and defend your network.

To download the complete Global Application & Network Security Report 2015-2016, which includes the ERT’s predictions and recommendations for how organizations can best prepare for mitigating cyber threats in 2016, please visit


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s


%d bloggers like this: