Libya
The DDoS threat landscape is constantly evolving, and to stay ahead of adversaries, ongoing monitoring and analysis are essential to detect how they are modifying their behavior and targets. NETSCOUT monitors the global threat landscape and drills into regional and country-level statistics to ensure that adversaries inform us of near-real-time trends. The country-level analytics featured on this page are automatically generated using our global threat analysis and collection platform, ATLAS, and provide a range of benchmarks for the specified time period, such as the top vectors used in DDoS attacks, top targeted industries, most vectors used in an attack, and total attack frequency.
Max Multivector Attack
Max number of vectors seen in a single attack
23
Attack Vectors Used
1. Bittorrent Amplification
2. DNS
3. DNS Amplification
4. ICMP
5. ISAKMP
6. L2TP Amplification
7. MS SQL RS Amplification
8. NTP Amplification
9. NetBIOS Amplification
10. OpenVPN Amplification
11. SSDP Amplification
12. STUN Amplification
13. TCP ACK
14. TCP RST
15. TCP SYN
16. TCP SYN/ACK Amplification
17. TP240 Amplification
18. UDP
19. Ubiquiti Amplification
20. mDNS Amplification
21. memcached Amplification
Top Attack Vectors
Dn
DNS Amplification
Number of Attacks
4,008
Mc
memcached Amplification
Number of Attacks
3,318
Mc
Memcached Amplification
Number of Attacks
3,205
Tr
TCP RST
Number of Attacks
2,802
Ds
DNS
Number of Attacks
2,586
Top Two Industries Under Attack
The following table lists the top vertical industries under attack from July 2025 to December 2025 by number of attacks.
| Rank | Vertical | Frequency | Average Duration |
|---|---|---|---|
| 1 |
|
1,356 | 113 Minutes |
| 2 |
|
258 | 186 Minutes |