Maritime Computer Emergency Response Team ADMIRAL dataset ADMIRAL dataset

Publicly disclosed information for this event

Index Number:
A port would have been victim of a Denial of Service attack.
Day Month Year Country Activity Incident Type
XX N/A 2013 United States Port Denial of Service


A research paper linking to a now vanished article (that I found back on mentions the possibility that the victim port would have been victim of a "large scale" Distributed Denial of Service attack in 2013.

The port mentioned, in other available studies, that it had to face at that date one million hacking attempts a day and two to three so-called "cyber storms" a year.


Port of Long Beach

Claimed/Reported Threat Actor




Main impact



Recommendations to Port to reduce Denial of Service risks:

  • Implement rate limiting and traffic filtering to mitigate the impact of incoming malicious traffic.
  • Check with your IT service provider that the resilience of its systems against such attack was tested.
  • Regularly monitor network traffic and set up alerting for unusual patterns or spikes.
  • Diversify your server locations and use failover systems to ensure service availability in case of an attack.
  • Establish an incident response plan to quickly mitigate and recover from DoS attacks.
Previous Next
Disclaimer: the data are provided as is. France Cyber Maritime and the M-CERT take no responsibility for the soundness, quality, precision, nor the eventual attribution made by the referenced URLs. We give a lot of respect and support to the victims of attacks. Yes, there are no common and shared incident IDs in cyber (for now!).
Files generated on Thursday, 02nd November 2023.
ADMIRAL is licensed under the Creative Commons CC-BY-NC license. Copyright © France Cyber Maritime 2023.