SlideShare uma empresa Scribd logo
1 de 4
Volume 6, Number 2

The State of
the Internet
2nd Quarter, 2013 executive summary
Executive Summary
Akamai’s globally-distributed Intelligent Platform allows us to gather massive amounts
of information on many metrics, including connection speeds, attack traffic, network
connectivity/availability/latency problems, and IPv6 growth/transition progress, as well
as traffic patterns across leading Web sites and digital media providers. Each quarter,
Akamai publishes the State of the Internet Report.
This quarter’s report includes data gathered from across the

Internet and Broadband Adoption

Akamai Intelligent Platform in the second quarter of 2013 about

In the second quarter, Akamai observed a 2.0% increase

attack traffic, broadband adoption, and mobile connectivity, as

in the number of unique IPv4 addresses connecting to the

well as trends seen in this data over time. In addition, this edition

Akamai Intelligent Platform, growing to over 752 million, or

of the report includes insight into attacks for which a group

approximately 18 million more than were seen in the first

known as the Syrian Electronic Army has claimed responsibility,

quarter of 2013. Looking at connection speeds, the global

the states of IPv4 exhaustion and IPv6 adoption, Internet

average connection speed climbed 5.2% to 3.3 Mbps, but the

disruptions that occurred during the quarter and observations

global average peak connection speed increased just 0.1% to

from Akamai partner Ericsson on data and voice traffic growth

18.9 Mbps. At a country level, South Korea had the highest

on mobile networks.

average connection speed at 13.3 Mbps, while Hong Kong
once again remained the region with the highest average peak

Security
During the second quarter of 2013, Akamai observed attack
traffic originating from source IP addresses in 175 unique
countries/regions. Note that our methodology captures the
source IP address of an observed attack and cannot determine
attribution of an attacker. Indonesia grew its share of observed
attack traffic, nearly doubling from the first quarter, growing to
38% and pushing China down to second place, with 33% of
observed attack traffic. Attack traffic from the United States once
again declined, dropping to 6.9%. Attack traffic continued to
become more concentrated, with the top 10 ports seeing 82% of
observed attacks. Thanks to the increased attack traffic seen from
Indonesia, Ports 80 and 443 were the most commonly targeted
ports, accounting for 41% of observed attacks combined. Port
445, the perennial top target, fell from first place for the first time
since the first quarter of 2008, dropping to 15% of observed
attacks. During the second quarter, Akamai’s customers reported
being targeted by 318 DDoS attacks, 54% more than the prior
quarter. Enterprise customers were the most frequently targeted,

connection speed at 65.1 Mbps. Globally, high broadband (>10
Mbps) adoption grew 13% quarter-over-quarter to 14%, and
South Korea remained the country with the highest level of
high broadband adoption, declining slightly to 45%. Global
broadband (>4 Mbps) adoption grew 11% to reach the 50%
mark, with Switzerland remaining in the top spot with 90%
broadband adoption.
Mobile Connectivity
In the second quarter of 2013, average connection speeds on
surveyed mobile network providers ranged from a high of 9.7
Mbps down to a low of 0.5 Mbps. Average peak connection
speeds ranged from 54.9 Mbps down to 2.2 Mbps. Based on
traffic data collected by Ericsson, the volume of mobile data
traffic almost doubled from the second quarter of 2012 to the
second quarter of 2013, and grew 14% between the first and
second quarters of 2013, while mobile voice traffic increased 5%
from the second quarter of 2012 to the second quarter of 2013.

hit by 42% of the reported attacks. In addition, a group known as

Analysis of Akamai IO data collected across the second quarter

the Syrian Electronic Army claimed responsibility for a number of

from a sample of requests to the Akamai Intelligent Platform

attacks launched against high-profile news and media sites.

indicates that for users of devices on cellular networks, slightly
more requests came from Android Webkit-based browsers than
from Apple Mobile Safari, with Webkit accounting for 38% of
requests, and Safari 34%. However, for users of mobile devices
across all networks (not just cellular), Apple Mobile Safari
accounted for just over 54% of requests, with Android Webkit
approximately half that, at over 27% of requests.

© 2013 Akamai Technologies, Inc. All Rights Reserved
What kinds of Web sites/applications are being targeted by DDoS attacks?
Public Sector
17
EMEA
37

Media &
Entertainment
53

Asia Pacific
79

Commerce
91

High Tech
23

Americas
202

Enterprise
134

Q2 2013 DDoS Attacks by Region

Q2 2013 DDoS Attacks by Sector

The number of DDoS attacks reported by customers in Asia nearly tripled in the second quarter, while customers in the Americas
accounted for nearly two-thirds of all attacks reported to Akamai. The number of attacks targeting customers in the Enterprise
sector nearly doubled in the second quarter, with attacks largely concentrated on customers in the Business Services and Financial
Services verticals. However, Web sites and applications in all sectors, across all geographic regions, are potential attack targets.
Have you taken steps to protect your mission critical Web sites and applications from DDoS attacks?

Have you made your Web sites/applications available over IPv6?
200
180

Hits / Second (Thousands)

160
140
120
100
80
60
40
20

24-Jun

17-Jun

10-Jun

3-Jun

27-May

20-May

13-May

6-May

29-Apr

22-Apr

15-Apr

8-Apr

1-Apr

0

IPv6 Traffic to the Akamai Intelligent Platform, Q2 2013
Peak daily IPv6 request volume on the Akamai Intelligent Platform grew by nearly 40% in the second quarter as an increasing
number of both mobile and fixed users around the world gained native IPv6 connectivity. As available IPv4 address space is
becoming an increasingly scarce resource across the Internet, making content available over IPv6 is becoming increasingly
important. Do you have plans and timelines for IPv6 adoption within your organization? Do you have plans and timelines for
making all of your Web-facing content accessible over IPv6, in addition to IPv4?
To read the full 2nd Quarter, 2013 State of the Internet Report on broadband adoption, connection speeds, Internet penetration, mobile
usage, attack traffic, and more, or to use the associated data visualization tools, go to: www.akamai.com/stateoftheinternet

© 2013 Akamai Technologies, Inc. All Rights Reserved
Acknowledgements
EDITOR: David Belson	

CONTRIBUTOR: Michael Smith	

CONTRIBUTOR: Svante Bergqvist (Ericsson)

ART DIRECTOR: Brendan O’Hara	

CONTRIBUTOR: Martin McKeay	

CONTRIBUTOR: Mathias Sintorn (Ericsson)

GRAPHIC DESIGNER: Jason Thornton	

CONTRIBUTOR: Martin Levy (Hurricane Electric)

CONTRIBUTOR: Jon Thompson	

CONTRIBUTOR: Geoff Huston (APNIC)

Please send comments, questions, and corrections to stateoftheinternet@akamai.com
Follow @akamai and @akamai_soti on

Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the company’s solutions
is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting
the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the
pace of innovation in a hyperconnected world, please visit www.akamai.com and follow @Akamai on Twitter.
Asia Pacific Headquarters	

1 Raffles Place, #16 – 61 One Raffles Place, Singapore 048616	

Tel +65.6593.8700	

Fax +65.6593.8799

European Headquarters	

Pfingstweidstrasse 60, 8005, Zurich, Switzerland	

Tel +41.43.210.91.00	

Fax +41.43.210.91.01

North American Headquarters	

8 Cambridge Center, Cambridge, Massachusetts, United States 02142	

Tel +1.617.444.3000	

Fax +1.617.444.3001

©2013 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Akamai and the Akamai wave logo are registered
trademarks. Other trademarks contained herein are the property of their respective owners. Akamai believes that the information in this publication is accurate as of its publication date; such information is subject
to change without notice.

Mais conteúdo relacionado

Mais procurados

Technology trends for 2016
Technology trends for 2016 Technology trends for 2016
Technology trends for 2016 albert joseph
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Oscar Romano
 
Cisco visual networking index forecast and methodology, 2013–2018
Cisco visual networking index forecast and methodology, 2013–2018Cisco visual networking index forecast and methodology, 2013–2018
Cisco visual networking index forecast and methodology, 2013–2018Webrazzi
 
Wi-Fi for UAE Mobile Service Providers: Offloading Mobile Data Traffic to Wi-...
Wi-Fi for UAE Mobile Service Providers: Offloading Mobile Data Traffic to Wi-...Wi-Fi for UAE Mobile Service Providers: Offloading Mobile Data Traffic to Wi-...
Wi-Fi for UAE Mobile Service Providers: Offloading Mobile Data Traffic to Wi-...Cisco Service Provider Mobility
 
Consumer barriers to mobile internet adoption in Asia
Consumer barriers to mobile internet adoption in AsiaConsumer barriers to mobile internet adoption in Asia
Consumer barriers to mobile internet adoption in AsiaTuan Anh Nguyen
 
Ericsson Mobility Report, MWC Edition, February 2016
Ericsson Mobility Report, MWC Edition, February 2016Ericsson Mobility Report, MWC Edition, February 2016
Ericsson Mobility Report, MWC Edition, February 2016Ericsson Latin America
 
NetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network PerformanceNetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network PerformanceNetMotion Wireless
 
Ericsson Mobility Report June 2013
Ericsson Mobility Report June 2013 Ericsson Mobility Report June 2013
Ericsson Mobility Report June 2013 Ericsson
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
 
Open Source Insight: HBO, Voting Machines & Car Washes Hacked & Black Hat /...
Open Source Insight:  HBO, Voting Machines & Car Washes Hacked  & Black Hat /...Open Source Insight:  HBO, Voting Machines & Car Washes Hacked  & Black Hat /...
Open Source Insight: HBO, Voting Machines & Car Washes Hacked & Black Hat /...Black Duck by Synopsys
 
Ericsson Traffic and Market Report- June 2012
Ericsson Traffic and Market Report- June 2012Ericsson Traffic and Market Report- June 2012
Ericsson Traffic and Market Report- June 2012Ericsson Slides
 
Ericsson Mobility Report, November 2015 – Regional report South East Asia and...
Ericsson Mobility Report, November 2015 – Regional report South East Asia and...Ericsson Mobility Report, November 2015 – Regional report South East Asia and...
Ericsson Mobility Report, November 2015 – Regional report South East Asia and...Ericsson
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 
Nigeria: An analysis of the Mobile Behavior of Social Economic Classes
Nigeria: An analysis of  the Mobile Behavior of Social Economic ClassesNigeria: An analysis of  the Mobile Behavior of Social Economic Classes
Nigeria: An analysis of the Mobile Behavior of Social Economic ClassesEniola Moronfolu
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service ProvidersNETSCOUT
 

Mais procurados (18)

Technology trends for 2016
Technology trends for 2016 Technology trends for 2016
Technology trends for 2016
 
Cisco Visual Networking Index White paper
Cisco Visual Networking Index White paper Cisco Visual Networking Index White paper
Cisco Visual Networking Index White paper
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
 
Cisco visual networking index forecast and methodology, 2013–2018
Cisco visual networking index forecast and methodology, 2013–2018Cisco visual networking index forecast and methodology, 2013–2018
Cisco visual networking index forecast and methodology, 2013–2018
 
Wi-Fi for UAE Mobile Service Providers: Offloading Mobile Data Traffic to Wi-...
Wi-Fi for UAE Mobile Service Providers: Offloading Mobile Data Traffic to Wi-...Wi-Fi for UAE Mobile Service Providers: Offloading Mobile Data Traffic to Wi-...
Wi-Fi for UAE Mobile Service Providers: Offloading Mobile Data Traffic to Wi-...
 
Consumer barriers to mobile internet adoption in Asia
Consumer barriers to mobile internet adoption in AsiaConsumer barriers to mobile internet adoption in Asia
Consumer barriers to mobile internet adoption in Asia
 
Ericsson Mobility Report, MWC Edition, February 2016
Ericsson Mobility Report, MWC Edition, February 2016Ericsson Mobility Report, MWC Edition, February 2016
Ericsson Mobility Report, MWC Edition, February 2016
 
NetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network PerformanceNetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network Performance
 
Ericsson Mobility Report June 2013
Ericsson Mobility Report June 2013 Ericsson Mobility Report June 2013
Ericsson Mobility Report June 2013
 
Et news
Et newsEt news
Et news
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 
Open Source Insight: HBO, Voting Machines & Car Washes Hacked & Black Hat /...
Open Source Insight:  HBO, Voting Machines & Car Washes Hacked  & Black Hat /...Open Source Insight:  HBO, Voting Machines & Car Washes Hacked  & Black Hat /...
Open Source Insight: HBO, Voting Machines & Car Washes Hacked & Black Hat /...
 
Ericsson Traffic and Market Report- June 2012
Ericsson Traffic and Market Report- June 2012Ericsson Traffic and Market Report- June 2012
Ericsson Traffic and Market Report- June 2012
 
Ericsson Mobility Report, November 2015 – Regional report South East Asia and...
Ericsson Mobility Report, November 2015 – Regional report South East Asia and...Ericsson Mobility Report, November 2015 – Regional report South East Asia and...
Ericsson Mobility Report, November 2015 – Regional report South East Asia and...
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Nigeria: An analysis of the Mobile Behavior of Social Economic Classes
Nigeria: An analysis of  the Mobile Behavior of Social Economic ClassesNigeria: An analysis of  the Mobile Behavior of Social Economic Classes
Nigeria: An analysis of the Mobile Behavior of Social Economic Classes
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers
 

Semelhante a The State of the Internet, 2nd Quarter, 2013 Executive Summary

VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the InternetAkamai Technologies
 
The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report Akamai Technologies
 
Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012C. Keiko Funahashi
 
State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012Akamai Technologies
 
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetAkamai Technologies
 
Reporte Estado del Internet
Reporte Estado del InternetReporte Estado del Internet
Reporte Estado del InternetHabacuc Guzman
 
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1Akamai Technologies
 
Akamai's State of the Internet
Akamai's State of the InternetAkamai's State of the Internet
Akamai's State of the InternetAlvaro Quesada
 
Akamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. ÇeyrekAkamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. ÇeyrekWebrazzi
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / securityThe Internet of Things
 
2015-cloud-security-report-q2
2015-cloud-security-report-q22015-cloud-security-report-q2
2015-cloud-security-report-q2Gaurav Ahluwalia
 
Ultra-high bandwidth via Colt Technology
Ultra-high bandwidth via Colt TechnologyUltra-high bandwidth via Colt Technology
Ultra-high bandwidth via Colt TechnologyLemar Amany
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 
Akamai State Internet Q2 2009
Akamai State Internet Q2 2009Akamai State Internet Q2 2009
Akamai State Internet Q2 2009pleasebugmenot
 
Akamai State of the Internet
Akamai State of the InternetAkamai State of the Internet
Akamai State of the InternetÉdgar Medina
 
Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008JOSÉ RAMON CARIAS
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Akamai state of_the_internet_q2_2010
Akamai state of_the_internet_q2_2010Akamai state of_the_internet_q2_2010
Akamai state of_the_internet_q2_2010Constantin Cocioaba
 
Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)Constantin Cocioaba
 

Semelhante a The State of the Internet, 2nd Quarter, 2013 Executive Summary (20)

VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
 
The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report
 
Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012
 
State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012
 
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
 
Reporte Estado del Internet
Reporte Estado del InternetReporte Estado del Internet
Reporte Estado del Internet
 
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
 
Akamai's State of the Internet
Akamai's State of the InternetAkamai's State of the Internet
Akamai's State of the Internet
 
Akamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. ÇeyrekAkamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. Çeyrek
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / security
 
2015-cloud-security-report-q2
2015-cloud-security-report-q22015-cloud-security-report-q2
2015-cloud-security-report-q2
 
Ultra-high bandwidth via Colt Technology
Ultra-high bandwidth via Colt TechnologyUltra-high bandwidth via Colt Technology
Ultra-high bandwidth via Colt Technology
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Akamai State Internet Q2 2009
Akamai State Internet Q2 2009Akamai State Internet Q2 2009
Akamai State Internet Q2 2009
 
Akamai State of the Internet
Akamai State of the InternetAkamai State of the Internet
Akamai State of the Internet
 
Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Akamai state of_the_internet_q2_2010
Akamai state of_the_internet_q2_2010Akamai state of_the_internet_q2_2010
Akamai state of_the_internet_q2_2010
 
Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)
 

Mais de Akamai Technologies

Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilienceAkamai Technologies
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationAkamai Technologies
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against MalwareAkamai Technologies
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access ModelAkamai Technologies
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유Akamai Technologies
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由Akamai Technologies
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因Akamai Technologies
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと きAkamai Technologies
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remotoAkamai Technologies
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remotoAkamai Technologies
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distanceAkamai Technologies
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...Akamai Technologies
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des RemotezugriffsAkamai Technologies
 
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Akamai Technologies
 
Chicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesChicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesAkamai Technologies
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Akamai Technologies
 
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAEdge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAAkamai Technologies
 
Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayAkamai Technologies
 

Mais de Akamai Technologies (20)

Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilience
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven Differentiation
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs
 
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2
 
Chicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWDChicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWD
 
Chicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesChicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden Features
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015
 
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAEdge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
 
Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBay
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Último (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

The State of the Internet, 2nd Quarter, 2013 Executive Summary

  • 1. Volume 6, Number 2 The State of the Internet 2nd Quarter, 2013 executive summary
  • 2. Executive Summary Akamai’s globally-distributed Intelligent Platform allows us to gather massive amounts of information on many metrics, including connection speeds, attack traffic, network connectivity/availability/latency problems, and IPv6 growth/transition progress, as well as traffic patterns across leading Web sites and digital media providers. Each quarter, Akamai publishes the State of the Internet Report. This quarter’s report includes data gathered from across the Internet and Broadband Adoption Akamai Intelligent Platform in the second quarter of 2013 about In the second quarter, Akamai observed a 2.0% increase attack traffic, broadband adoption, and mobile connectivity, as in the number of unique IPv4 addresses connecting to the well as trends seen in this data over time. In addition, this edition Akamai Intelligent Platform, growing to over 752 million, or of the report includes insight into attacks for which a group approximately 18 million more than were seen in the first known as the Syrian Electronic Army has claimed responsibility, quarter of 2013. Looking at connection speeds, the global the states of IPv4 exhaustion and IPv6 adoption, Internet average connection speed climbed 5.2% to 3.3 Mbps, but the disruptions that occurred during the quarter and observations global average peak connection speed increased just 0.1% to from Akamai partner Ericsson on data and voice traffic growth 18.9 Mbps. At a country level, South Korea had the highest on mobile networks. average connection speed at 13.3 Mbps, while Hong Kong once again remained the region with the highest average peak Security During the second quarter of 2013, Akamai observed attack traffic originating from source IP addresses in 175 unique countries/regions. Note that our methodology captures the source IP address of an observed attack and cannot determine attribution of an attacker. Indonesia grew its share of observed attack traffic, nearly doubling from the first quarter, growing to 38% and pushing China down to second place, with 33% of observed attack traffic. Attack traffic from the United States once again declined, dropping to 6.9%. Attack traffic continued to become more concentrated, with the top 10 ports seeing 82% of observed attacks. Thanks to the increased attack traffic seen from Indonesia, Ports 80 and 443 were the most commonly targeted ports, accounting for 41% of observed attacks combined. Port 445, the perennial top target, fell from first place for the first time since the first quarter of 2008, dropping to 15% of observed attacks. During the second quarter, Akamai’s customers reported being targeted by 318 DDoS attacks, 54% more than the prior quarter. Enterprise customers were the most frequently targeted, connection speed at 65.1 Mbps. Globally, high broadband (>10 Mbps) adoption grew 13% quarter-over-quarter to 14%, and South Korea remained the country with the highest level of high broadband adoption, declining slightly to 45%. Global broadband (>4 Mbps) adoption grew 11% to reach the 50% mark, with Switzerland remaining in the top spot with 90% broadband adoption. Mobile Connectivity In the second quarter of 2013, average connection speeds on surveyed mobile network providers ranged from a high of 9.7 Mbps down to a low of 0.5 Mbps. Average peak connection speeds ranged from 54.9 Mbps down to 2.2 Mbps. Based on traffic data collected by Ericsson, the volume of mobile data traffic almost doubled from the second quarter of 2012 to the second quarter of 2013, and grew 14% between the first and second quarters of 2013, while mobile voice traffic increased 5% from the second quarter of 2012 to the second quarter of 2013. hit by 42% of the reported attacks. In addition, a group known as Analysis of Akamai IO data collected across the second quarter the Syrian Electronic Army claimed responsibility for a number of from a sample of requests to the Akamai Intelligent Platform attacks launched against high-profile news and media sites. indicates that for users of devices on cellular networks, slightly more requests came from Android Webkit-based browsers than from Apple Mobile Safari, with Webkit accounting for 38% of requests, and Safari 34%. However, for users of mobile devices across all networks (not just cellular), Apple Mobile Safari accounted for just over 54% of requests, with Android Webkit approximately half that, at over 27% of requests. © 2013 Akamai Technologies, Inc. All Rights Reserved
  • 3. What kinds of Web sites/applications are being targeted by DDoS attacks? Public Sector 17 EMEA 37 Media & Entertainment 53 Asia Pacific 79 Commerce 91 High Tech 23 Americas 202 Enterprise 134 Q2 2013 DDoS Attacks by Region Q2 2013 DDoS Attacks by Sector The number of DDoS attacks reported by customers in Asia nearly tripled in the second quarter, while customers in the Americas accounted for nearly two-thirds of all attacks reported to Akamai. The number of attacks targeting customers in the Enterprise sector nearly doubled in the second quarter, with attacks largely concentrated on customers in the Business Services and Financial Services verticals. However, Web sites and applications in all sectors, across all geographic regions, are potential attack targets. Have you taken steps to protect your mission critical Web sites and applications from DDoS attacks? Have you made your Web sites/applications available over IPv6? 200 180 Hits / Second (Thousands) 160 140 120 100 80 60 40 20 24-Jun 17-Jun 10-Jun 3-Jun 27-May 20-May 13-May 6-May 29-Apr 22-Apr 15-Apr 8-Apr 1-Apr 0 IPv6 Traffic to the Akamai Intelligent Platform, Q2 2013 Peak daily IPv6 request volume on the Akamai Intelligent Platform grew by nearly 40% in the second quarter as an increasing number of both mobile and fixed users around the world gained native IPv6 connectivity. As available IPv4 address space is becoming an increasingly scarce resource across the Internet, making content available over IPv6 is becoming increasingly important. Do you have plans and timelines for IPv6 adoption within your organization? Do you have plans and timelines for making all of your Web-facing content accessible over IPv6, in addition to IPv4? To read the full 2nd Quarter, 2013 State of the Internet Report on broadband adoption, connection speeds, Internet penetration, mobile usage, attack traffic, and more, or to use the associated data visualization tools, go to: www.akamai.com/stateoftheinternet © 2013 Akamai Technologies, Inc. All Rights Reserved
  • 4. Acknowledgements EDITOR: David Belson CONTRIBUTOR: Michael Smith CONTRIBUTOR: Svante Bergqvist (Ericsson) ART DIRECTOR: Brendan O’Hara CONTRIBUTOR: Martin McKeay CONTRIBUTOR: Mathias Sintorn (Ericsson) GRAPHIC DESIGNER: Jason Thornton CONTRIBUTOR: Martin Levy (Hurricane Electric) CONTRIBUTOR: Jon Thompson CONTRIBUTOR: Geoff Huston (APNIC) Please send comments, questions, and corrections to stateoftheinternet@akamai.com Follow @akamai and @akamai_soti on Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the company’s solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com and follow @Akamai on Twitter. Asia Pacific Headquarters 1 Raffles Place, #16 – 61 One Raffles Place, Singapore 048616 Tel +65.6593.8700 Fax +65.6593.8799 European Headquarters Pfingstweidstrasse 60, 8005, Zurich, Switzerland Tel +41.43.210.91.00 Fax +41.43.210.91.01 North American Headquarters 8 Cambridge Center, Cambridge, Massachusetts, United States 02142 Tel +1.617.444.3000 Fax +1.617.444.3001 ©2013 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Akamai and the Akamai wave logo are registered trademarks. Other trademarks contained herein are the property of their respective owners. Akamai believes that the information in this publication is accurate as of its publication date; such information is subject to change without notice.