Europe, Middle East, and Africa
Flag of United Republic of Tanzania

United Republic of Tanzania

The DDoS threat landscape is constantly evolving, and to stay ahead of adversaries, ongoing monitoring and analysis are essential to detect how they are modifying their behavior and targets. NETSCOUT monitors the global threat landscape and drills into regional and country-level statistics to ensure that adversaries inform us of near-real-time trends. The country-level analytics featured on this page are automatically generated using our global threat analysis and collection platform, ATLAS, and provide a range of benchmarks for the specified time period, such as the top vectors used in DDoS attacks, top targeted industries, largest attack by bandwidth and throughput, most vectors used in an attack, and total attack frequency.

Max Multivector Attack

Max number of vectors seen in a single attack

13

Attack Vectors Used

1. Bittorrent Amplification
2. DNS Amplification
3. ICMP
4. ISAKMP
5. NTP Amplification
6. STUN Amplification
7. TCP ACK
8. TCP RST
9. TCP SYN
10. TCP SYN/ACK Amplification
11. UDP

Top Attack Vectors

Tk

TCP SYN/ACK Amp

Number of Attacks

34

Ta

TCP ACK

Number of Attacks

33

Dn

DNS Amp

Number of Attacks

32

Tr

TCP RST

Number of Attacks

30

St

STUN Amp

Number of Attacks

29

Top Six Vertical Industries Under Attack

The following industry chart shows the most targeted sectors in 1H 2024 by number of attacks.

Rank Vertical Frequency Max Attack Max Impact Average Duration
1
Wireless Telecommunications Carriers (except Satellite)
99 6.4 Gbps 1.96 Mpps 19 Minutes
2
All Other Transit and Ground Passenger Transportation
8 0.13 Gbps 0.05 Mpps 7 Minutes
3
Wired Telecommunications Carriers
7 1.2 Gbps 0.11 Mpps 7 Minutes
4
Soft Drink Manufacturing
3 0.02 Gbps 0.04 Mpps 4 Minutes
5
Computer Systems Design Services
2 0.27 Gbps 0.07 Mpps 5 Minutes
6
Software Publishers
1 0.01 Gbps 0.02 Mpps 9 Minutes