4 DATA ANALYSIS
Since DRDoS attacks use IP spoofing, the source IP
addresses of the requests were assumed to be from the
victims. These addresses were geolocated using the
MaxMind database
1
. As this resulted in victims in
more than 230 different countries and analyzing every
country would be unwieldy, we focused on the coun-
tries with the highest number of attacks. We consid-
ered the countries with at least 10% of attacks in each
continent. This criterion allows including the most
relevant countries in each region, even if they have
relatively few attacks compared to countries in regions
with heavier traffic. Dividing victims by continent
allows (i) isolating behaviors that could be obscured
when looking only at overall traffic, and (ii) highlight-
ing differences between regions.
4.1 Geographic Distribution
Table 1 shows an overview of the data collected by
the honeypots, presenting the distribution according to
each geographic location. Six continents are presented,
as the MaxMind database associates IP addresses from
Central American countries with North America (
NA
)
or South America (
SA
), depending on the country.
Addresses that could not be geolocated were labeled
as “unknown”; such addresses account for 0.25% of
the attacks, and were excluded from the analysis.
The overall number of attacks observed in North
America (
NA
) is higher than in any other region, fol-
lowed by Asia (
AS
) and Europe (
EU
) with similar
numbers of attacks. Other regions received a relevant
number of attacks, however not in the same propor-
tion. Brazil (
BR
), China (
CN
), Hong Kong (
HK
), and
the United States (
US
) have a higher concentration
in the number of attacks compared to other countries,
and this behavior influences their respective continents.
This observation was already expected since other stud-
ies already showed a concentration of attacks in these
continents (Heinrich et al., 2021; Krämer et al., 2015).
Regarding the number of requests for each region,
Asia is the region with the higher concentration of re-
quests, despite
NA
having a higher concentration of
attacks. This difference between attacks and requests
shows that, from our vantage point,
AS
receives at-
tacks with a higher number of requests in comparison
with attacks in other continents. The same pattern ap-
pears when we consider the number of requests per
attack in each region. Regions such as
AS
, Africa (
AF
),
SA
, and Oceania (
OC
) appear to have fewer attacks
with a higher number of requests in comparison to
regions such as
NA
and
EU
. Even if we only consider
1
https://dev.maxmind.com/geoip
the median,
AS
and
OC
still present this pattern. In
AF
and
SA
the pattern disappears, and there is a smaller
number of attacks that concentrate a high number of
requests.
AF
has the lowest number of attacks per day
in comparison with the other regions.
Some discussions about the geolocation of DRDoS
victims are found in the literature. In (Krämer et al.,
2015) the authors observed the
US
with 32.2% of their
victims, followed by
CN
(14.2%) and France (
FR
)
(8.5%). A 2017 report from Akamai (Akamai, 2017)
shows that the
US
was the country with the most at-
tacks (over 238 M attacks, 11
×
bigger than the second-
placed country), followed by
BR
and the United King-
dom (
UK
). According to Netscout, in 2021 the
US
,
CN
, and Germany (
DE
) were the countries with more
UDP reflectors available (Netscout, 2021b). Similar
results are presented in (Heinrich et al., 2021), with
the only change being the
UK
coming in third place.
While
US
and
CN
consistently appear atop the rank-
ings, the countries that come next vary according to the
year of observation. The war in Ukraine has also seen
changes in the attacks seen in Ukraine and Russia, with
media and financial companies being targeted (Cloud-
flare, 2022). Cloudflare reported increased frequency
and duration of large attacks in the fourth quarter of
2022, as well as the continued growth of ransom DDoS
attacks (Cloudflare, 2023).
Our observations show that 82.6% of attacks are
shorter than 10 min, 89.9% are shorter than 30 min,
and 93.0% are shorter than 1 hour. Median attack
durations are lower than the respective means, with
medians for all continents below 4.8 min. Therefore,
most observed attacks have a short duration, lasting
only a few minutes; durations have not changed much
over the years. The average duration across the conti-
nents is similar, except for
SA
, where it is noticeably
longer. In the literature, the average duration observed
varies, as summarized in Table 2. The average dura-
tions found in studies using honeypot data (Krämer
et al., 2015; Thomas et al., 2017; Jonker et al., 2017;
Heinrich et al., 2021) are similar to our data (excluding
SA).
To account for carpet bombing (CB) attacks, we
define a victim to be a /24 CIDR block; as such, at-
tacks targeting, e.g., 192.0.2.1 and 192.0.2.4 in the
same time frame are counted as a CB attack targeting
192.0.2.0/24, which is the victim here. In
SA
we ob-
served that, on average, attacks targeted nine unique
IP addresses per victim, and 50.0% of the attacks used
carpet bombing. In the other regions, the vast majority
of attacks are aimed at a single IP address. CB attacks
have grown in SA by an average of 7.1% each year,
with a remarkable increase of 29.5% in 2022 alone. As
our honeypots are located in
SA
, it is possible that CB
Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks
23