Europe, Middle East, and Africa
Flag of Lebanon

Lebanon

The DDoS threat landscape is constantly evolving, and to stay ahead of adversaries, ongoing monitoring and analysis are essential to detect how they are modifying their behavior and targets. NETSCOUT monitors the global threat landscape and drills into regional and country-level statistics to ensure that adversaries inform us of near-real-time trends. The country-level analytics featured on this page are automatically generated using our global threat analysis and collection platform, ATLAS, and provide a range of benchmarks for the specified time period, such as the top vectors used in DDoS attacks, top targeted industries, most vectors used in an attack, and total attack frequency.

Max Multivector Attack

Max number of vectors seen in a single attack

18

Attack Vectors Used

1. Bittorrent Amplification
2. DNS
3. DNS Amplification
4. ICMP
5. ISAKMP
6. L2TP Amplification
7. MS SQL RS Amplification
8. NTP Amplification
9. OpenVPN Amplification
10. STUN Amplification
11. TCP ACK
12. TCP RST
13. TCP SYN
14. TCP SYN/ACK Amplification
15. UDP

Top Attack Vectors

Tk

TCP SYN/ACK Amplification

Number of Attacks

996

Ta

TCP ACK

Number of Attacks

878

Ts

TCP SYN

Number of Attacks

824

Im

ICMP

Number of Attacks

735

Tr

TCP RST

Number of Attacks

728

Top Six Industries Under Attack

The following table lists the top vertical industries under attack from July 2025 to December 2025 by number of attacks.

Rank Vertical Frequency Average Duration
1
Wireless Telecommunications Carriers (except Satellite)
272 34 Minutes
2
Wired Telecommunications Carriers
117 145 Minutes
3
Commercial and Institutional Building Construction
73 207 Minutes
4
Colleges Universities and Professional Schools
72 1,012 Minutes
5
Book Retailers and News Dealers
33 36 Minutes
6
Media Representatives
15 387 Minutes