India Among Top 10 Sources for DDoS Attacks in Q2 2015: Akamai

Advertisement
By Manish Singh | Updated: 19 August 2015 20:07 IST

As our economy becomes increasingly reliant on the Internet, it is now more important than ever to make sure the correct defences are in place. Security attacks in general - DDoS attacks in particular - are growing at a rapid pace globally and evolving to become more sophisticated, screams the latest State of the Internet - Security report from Akamai for Q2 2015.

India was one of the top target countries for Web Application Attacks in Q2 2015. Of all the attacks, 1 percent were targeted at India, the report said. With 81 percent of the market grab, the US remains to be the favourite spot for hackers.

Interestingly, not only was India among the most targeted nations, it was also the source of several such attacks. The country was among the top 10 sources for the DDoS attacks. Of all the attacks, 7.43 percent originated from the country. With 37.01 percent of all share, China remains the largest source for the same.

Advertisement

In the past quarter, the number of DDoS attacks, a security attack in which the server of a service is flooded with bogus traffic to take them down, increased by 7 percent compared to Q1 2015, and were up 132 percent compared to the Q2 2014. Average peak attack and volume, Akamai reported, also saw an upward spike, though they significantly dropped compared to Q2 2014.

Advertisement

More alarmingly, these attacks are happening at large scale. Akamai noted that in the past three quarters, the number of DDoS attacks has doubled. During this period, we saw 12 DDoS attacks that clocked at more than a whopping 100 Gigabits per seconds. The strongest attack peaked at 240 gigabits per second and persisted for more than 13 hours. Similarly, five attacks clocked at 50 million packets per second, something which only a handful of companies have the power to stand against.

The report from one of the biggest content distribution networks also revealed that attackers have become more aggressive at exploiting the limitations in old generation protocols. Older protocols such as RIPv1, CHARGEN, and NTP were among the most exploited.

 

Catch the latest from the Consumer Electronics Show on Gadgets 360, at our CES 2026 hub.

Further reading: Akamai, DDoS, India, Security, Vulnerability
Advertisement

Related Stories

Popular Mobile Brands
  1. The Raja Saab OTT Release Reportedly Leaked Online: What You Need to Know
  1. James Webb Telescope Finds Rare Cosmic Dust in One of the Universe’s Most Primitive Galaxies
  2. NASA Spots Giant Antarctic Iceberg Turning Blue as It Nears Breakup
  3. No Doctors in Space: How NASA Handles Medical Emergencies on the ISS
  4. Rubin Observatory Discovers Fastest-Spinning Large Asteroid Ever Seen
  5. Physicists Deploy Quantum Sensors to Hunt the Universe’s Missing Matter
  6. Bha Bha Ba OTT Release Date: Everything You Need to Know About This Malayalam Comedy Thriller Film
  7. The Wrecking Crew OTT Release Date: When and Where to Watch Dave Bautista and Jason Momoa Starrer Online?
  8. The Raja Saab OTT Release Reportedly Leaked Online: What You Need to Know Prabhas Starrer Movie
  9. Joto Kando Kolkatatei Now Streaming on Zee 5: Everything You Need to Know About This Bengali Mystery Film Online
  10. Fire Force Season 3 Part 2 Now Streaming on Crunchyroll: Know Everything About This Season Finale
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.