2021 China Website Security Report, 2021 Data Security Law of the People's Republic of China

1 year ago (2023-12-25) Chief Editor
4 minutes
three hundred and eleven
zero

Security 419 learned that Qi'an Information Industry Security Research Center and other internal departments jointly released the 2021 China Website Security Report (hereinafter referred to as the "Report") recently, which analyzed and studied the overall situation of domestic website security in 2021 from the dimensions of high-risk port exposure, third-party vulnerability report, website attack interception, DDoS attacks, zombie networks, etc.

High risk port exposure has attracted attention, and information leakage vulnerabilities account for up to 36%

In recent years, the website security construction of domestic large and medium-sized government and enterprise institutions has made great progress, but security risks still exist widely. According to the data in the Report, in 2021, Qianxin Global Eagle System will monitor 1.83 billion domestic website assets, covering 60 million independent Web IP addresses, and each independent Web IP address will correspond to 30.5 websites on average.

Among all monitored websites, there are about 66.446 million websites with high-risk protocol (such as SSH, SMB, MySQL, etc.) port exposure (referred to as high-risk port exposure), accounting for 3.6% of the total monitored websites. From the perspective of geographical distribution, East China has the largest number of websites with high-risk port exposure, accounting for 47.6% nationwide, followed by South China, accounting for 22.5%; North China ranked third, accounting for 11.1%.

According to the vulnerability report, the Report shows that in 2021, the Butian Vulnerability Response Platform included 146293 security vulnerabilities of various websites nationwide, involving 115243 websites. From the distribution of vulnerability causes, 99.1% of the relatively isolated event type vulnerabilities are caused by the website's own development, construction, operation and maintenance management, and only 0.9% of the common vulnerabilities in similar websites or functional modules of similar websites are caused by website development platforms, development tools or development languages.

In addition, from the perspective of the technical types of vulnerabilities, in 2021, among the website security vulnerabilities included in the Patian platform, information disclosure vulnerabilities accounted for the highest percentage, reaching 36.0%, followed by SQL injection vulnerabilities, accounting for 18.4%, and weak passwords accounting for 12.9%. From the perspective of industry distribution, IT information technology and Internet communication are the most, accounting for 35.5% of the country's total, followed by manufacturing, education and training.

Hackers can also take advantage of website security vulnerabilities to launch attacks on websites. The use of website protection means can detect and intercept such attacks. The Report shows that in 2021, Qianxin's website guards will intercept 9.51 billion attacks on various websites for 403000 websites nationwide, with an average of 26.049 million attacks per day. Among them, abnormal protocol requests account for the highest proportion, accounting for 58.1% of the total number of website guards' attacks intercepted. The types of attacks ranked top 10 in terms of interceptions, accounting for 84.7% of the total interceptions.

NTP becomes the main type of DDoS attacks, and botnets are still the parasitic cancer of the Internet

According to the DDoS attacks, the data in the Report shows that throughout 2021, Qi'an Information Technology Research Institute has monitored a total of 287000 IP addresses across the country were subjected to 842000 DDoS attacks, of which about 4.3% were DDoS attacks, and a variety of other types of attack methods were used together. Attackers use a variety of attack means according to the specific environment of the target system, which also increases the cost of response and processing of the attacked.

From the perspective of attack types, NTP is the largest, accounting for 80.4% of the total number of DDoS attacks in China throughout the year; Next are Jenkins, Memcached and SSDP. It can be seen that NTP, Jenkins, Memcached and SSDP are the main attack methods of DDoS.

In addition, the Report cites monitoring data and shows that in 2021, there will be about 530000 active botnet infected node IP addresses nationwide (de duplication statistics). Among them, there are about 72000 vulnerability attack sources and 388000 weak password burst sources.

This article is written by: Chief Editor Published on Software Development of Little Turkey , please indicate the source for reprinting: //hongchengtech.cn/blog/3186.html
Kuke_WP editor
author

Related recommendations

1 year ago (2024-02-20)

How does the WeChat management system manage enterprise WeChat chat content, and chat records of enterprise WeChat administrator permissions

Original title: How does the WeChat management system manage enterprise WeChat chat content How does the enterprise WeChat chat content manage enterprise WeChat chat content? Most WeChat chat content viewers on the market are for private viewing, but viewing WeChat chat content in enterprises is also particularly important. Without the use of WeChat management system, many behaviors such as abusing customers, flying orders, and randomly promising customers are
six hundred and sixty-four
zero
1 year ago (2024-02-20)

Liaocheng Chiping District Sub branch of Agricultural Development Bank of China carried out the second online exercise of the new generation credit management system, and how to do a good job in credit work as a member of Agricultural Development Bank of China

Recently, Chiping District Sub branch of Agricultural Development Bank of China actively implemented the second phase online exercise of the new generation credit management system. In accordance with the requirements of the overall exercise plan issued by the superior bank, it carefully deployed, carefully organized, clearly defined the division of labor, strengthened the coordination and linkage between various departments, closely cooperated, and effectively performed various work responsibilities during the exercise. Chiping District Sub branch organized all staff of the Customer Department to participate in the online drill
four hundred and ninety-one
zero
1 year ago (2024-02-18)

Content marketing is hard to do? Zhiqu Baichuan teaches you how to easily build a content management system, and what needs to be done well in content marketing

Two days ago, we received an official email "to Baichuan to remove from the salesforce app store" - because the United States issued an administrative order on August 6, 2020, prohibiting "any WeChat related transactions", which came into effect 45 days after the administrative order was issued (that is, September 20). The "one-stop marketing cloud" provided by Zhiqu Baichuan includes
three hundred and forty-three
zero
1 year ago (2024-02-18)

Why Enterprise Content Management System?, Why did you choose Business Management

As paper has almost disappeared, your company's important documents and information need to be digitized, stored and used in a way that supports processes and workflows. Through the enterprise content management (ECM) system, you can better manage enterprise content and choose a more interactive way to process the information of the entire enterprise. Do you check the internal documents, invoices, training materials, contracts, finance
two hundred and eighty-nine
zero

comment

0 people have participated in the review

Scan code to add WeChat

contact us

WeChat: Kuzhuti
Online consultation: