figures
Blog

Holiday Traffic Report, HPACK Feature Of HTTP/2 And More in This Weeks News

Admin Globaldots
06.12.2016
image 3 Min read

Real-time insights on holiday traffic

Fastly, given they provide CDN services to a lot of businesses, has an unique view of real-time aggregated traffic patterns on the web. This past week, they’ve decided to share these insights in a detailed article. Fact of the matter is that 30% of annual retails sales happen between Black Friday and Christmas, and 70% of consumers planned on doing shopping online this year. All of this resulted in a 207% increase in traffic as compared to normal 11AM ET on Black Friday.

Customers wrap up their holiday shopping during Walmart's Black Friday events on Thursday November 27, 2014 in Bentonville, Ark. Deep savings continue at Walmart Friday though Cyber Monday as part of five days of events in stores and online. (Photo by Gunnar Rathbun/Invision for Walmart/AP Images)

Image Source

See the insights: Fastly

HPACK – the silent feature of HTTP/2

First HTTP compression was performed in the TLS layer using gzip, after that came SPDY with a new, dedicated compression algorithm. SPDY still used the DEFLATE algorithm along with Huffman codes and string matching. All this means they were vulnerable to the CRIME attack, and this made all edge networks disable header compression. HTTP/2 now supports a solution to this problem called HPACK which is a dedicated header compression algorithm which is resilient to CRIME. In layman’s terms:

By implementing HPACK compression for HTTP response headers we’ve seen a significant drop in egress bandwidth. HPACK has been enabled for all Cloudflare customers using HTTP/2, all of whom benefit from faster, smaller HTTP responses.
– Cloudflare blog

https-and-hpack

Image Source

Read more: Cloudflare Blog

Bot Threats during the Holidays

As we’ve previously mentioned, holiday ecommerce activities are dramatically rising and this means more opportunities for cybercriminals. PerimiterX published an article about what those threats may be and what should every business focus on to be safe from fraudulent consumers.

Santa, a master at large-scale behavior analysis, used to know who’s good and “who’s bad.” That’s much more difficult this year, as more professional cybercriminal organizations use sophisticated bots to get their Christmas bonus. It may look like Mom or Dad shopping – it may even BE Mom or Dad – but they could carry a significant threat.

Read more: PerimiterX Blog

European Commission hit by a DDoS attack

In other news, the European Commission confirmed that their network was hit by a large-scale DDoS attack that lasted for several hours. No further details have been disclosed at this moment, but one thing is clear – it has been successfully stopped although connections speeds have been considerably affected. The identity of the perpetrators is still not resolved as well as their motives.

european-commission-building

Image Source

Read more: Hacking Threat

Zenedge informs of record growth in third quarter

Zenedge, one of the leading cybersecurity platforms, posted three consecutive quarters of record growth in 2016. In Q3 Zenedge saw triple-digit year-over-year revenue growth, as well as an influx of big deals and high-profile costumers. All of this should definetly be accredited to their AI-driven Web Application Firewall (WAF) and their sophisticated DDoS mitigation systems.

“As we look into this market, we see that our platform and AI driven engine is ideally suited to address the bot detection and mitigation challenges,”

“We even had a hacker come to our web site and comment on how good our technology was!”
– Alp Hug (Co-founder of Zenedge)

Read more: Bizety

Comments

0 comments

There’s more to see

slider item
Identity & Access Management (IAM)
4 Credential Phishing Myths You Can’t Ignore
Li-Or Amir 28.04.21

Credential phishing is the practice of stealing user ID/email address and password combinations by masquerading as a reputable or known entity. Attackers then use the victim’s credentials to carry out attacks on a secondary target, such as breaching into enterprise networks. GlobalDots, in collaboration with Identity Governance market leader Okta, gathered 4 common misconceptions which lead […]

Read more
slider item
Content Delivery Network (CDN)
Multi Content Delivery Network Explained
Admin Globaldots 21.04.21

Your query on the web to find out about CDN, multi CDN, federated CDN, hybrid CDN and why is it important at all, can easily turn into a stream of different, sometimes confusing information, as these terms are getting more and more popular, and definitions are more and more dispersed, given the number of providers […]

Read more
slider item
Infrastructure DDoS
DDoS (Distributed Denial of Service) Explained
Admin Globaldots

DDoS Mitigation & Protections services are a crucial part of any internet business strategy. At GlobalDots we analyze, implement and maintain Security for variety of companies, from Fortune 500 to startups and small-to-medium enterprises. Since the topic is broad and many of our customers ask very specific questions, we decided to put together this resource […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure