Internet Trends 2024: Growth in Traffic, Quantum Encryption, and Cyber Threats

December 19, 2024

The Cloudflare Radar Year in Review report for 2024 presents a comprehensive analysis of the ever-evolving internet landscape, utilizing data collected from over 330 cities across 120 countries. This annual report provides invaluable insights derived from Cloudflare’s extensive network, which handles an astounding volume of data: a staggering 63 million HTTPS requests and 42 million DNS requests per second. This in-depth analysis exposes key trends, persistent threats, and emerging technologies that continue to shape the global internet.

Surge in Global Internet Traffic

Despite expectations of a potential slowdown, global internet traffic saw a significant surge in 2024, growing by 17.2%. While this growth rate is slightly lower compared to previous years—25% in 2023 and 23% in 2022—it remains substantial. This ongoing expansion can be attributed to the continuous influx of new content, the rapid proliferation of mobile applications, and the digitization of traditionally paper-based processes. These factors collectively ensure that internet traffic growth maintains a robust trajectory.

The report underscores how the steady addition of new content and services keeps users engaged, driving internet traffic upwards. Notably, the rise of streaming services, online gaming, and social media platforms contributes significantly to this growth. Additionally, the increasing reliance on cloud services for both personal and professional uses has further fueled the surge in internet traffic. Cloud-based storage, collaboration tools, and software applications have become integral to everyday tasks, resulting in heightened internet usage.

Moreover, mobile technology plays a crucial role in this expansion. With more people accessing the internet via smartphones and tablets, mobile devices have generated 41.3% of global traffic in 2024. This trend highlights the importance of mobile optimization for websites and services to accommodate the growing number of mobile users. The ubiquity of mobile devices ensures that internet access is more widespread than ever before, driving traffic growth and emphasizing the need for businesses to prioritize mobile-friendly user experiences.

Rise of Post-Quantum Encryption

A standout highlight of the Cloudflare Radar Year in Review report is the remarkable increase in the adoption of post-quantum encryption. This advanced technology addresses the escalating threat posed by the development of powerful quantum computers, which have the potential to break traditional encryption methods. In 2024, post-quantum encrypted traffic made up 13% of all TLS 1.3 traffic. This notable rise is largely attributed to several prominent browser platforms, including Google Chrome and Mozilla Firefox, implementing post-quantum encryption as a default feature across their supported platforms.

Cloudflare had taken a proactive stance by enabling post-quantum key agreements on its network by default as early as October 2022. However, the adoption surged significantly after major browsers began to support the technology natively. David Belson, head of data and insight at Cloudflare, emphasized the critical importance of additional server platforms, such as CDN providers, cloud providers, and SaaS vendors, making post-quantum encryption readily available to customers by default.

Belson highlighted the non-trivial engineering work required to accomplish this goal and stressed the urgency of beginning this work promptly to stay ahead of quantum computing advancements. The adoption of post-quantum encryption is, therefore, a pivotal step in safeguarding the security and privacy of online communications in the face of emerging technological threats. As quantum computing continues to progress, the implementation of such encryption measures becomes increasingly crucial.

Cyber Threats and Targeted Industries

The report also reveals fascinating insights into the industries most targeted by cyber attacks in 2024. Surprisingly, the gaming industry has overtaken the finance sector as the most targeted industry for cyber attacks. This shift underscores the growing value and influence of the gaming industry within the digital ecosystem. The increasing popularity of online gaming platforms, coupled with the significant financial transactions involved, has made the gaming industry an attractive target for cybercriminals.

Furthermore, the report elaborates on how mobile devices generated 41.3% of global traffic, reflecting the increasing reliance on mobile technology for internet access and activities. Among other significant findings, the report highlights that 4.3% of analyzed emails were identified as malicious, indicating the persistent threat of email-based cyber attacks. Email remains a prevalent vector for phishing and malware distribution, posing significant risks to individuals and organizations alike.

A surprising and persistent threat identified in the report is the exploitation of the Log4j vulnerability. Initially disclosed in 2021, the vulnerability in the widely used open-source Java-logging Apache Log4j software remains a major concern. Despite being a three-year-old vulnerability, attackers continue to attempt to exploit it, suggesting some success in their endeavors, which encourages them to persist. This continued threat underlines the complexities faced by organizations in defending against vulnerabilities.

Challenges in Patching Vulnerabilities

Addressing vulnerabilities through patching has proven to be an intricate process that requires substantial time, financial resources, and efficient tools. For larger enterprises, patching can result in operational downtime, adding another layer of complexity to the process. Belson emphasized that in today’s era of rapid innovation, there is often a priority on speed to market over security, which exacerbates the challenge of timely patching.

The complex nature of the software supply chain makes it difficult for organizations to have a comprehensive view of all the software in their systems. As a result, some organizations may not even be aware of potential vulnerabilities that need to be patched. This lack of visibility, coupled with the intricate dependencies within software systems, contributes to the ongoing threat posed by vulnerabilities like Log4j. The importance of maintaining a robust and thorough vulnerability management practice cannot be overstated.

Organizations must prioritize security, investing in the necessary resources to implement robust vulnerability management practices. This includes regular software audits, timely patching, and the adoption of advanced security measures to protect against emerging threats. By doing so, businesses can mitigate vulnerabilities and enhance their overall security postures, ensuring better protection against cyber threats.

Growth in Satellite Internet and Google’s Dominance

The Cloudflare Radar Year in Review report for 2024 delivers a detailed analysis of the ever-changing internet landscape. Drawing on data from more than 330 cities in 120 countries, this annual report offers crucial insights grounded in Cloudflare’s vast network. This network manages an astonishing volume of data, with 63 million HTTPS requests and 42 million DNS requests processed every second. The comprehensive analysis in this report reveals noteworthy trends, ongoing threats, and rising technologies that are continuously shaping the global internet.

Beyond just numbers, the report sheds light on the dynamic shifts in internet traffic patterns, highlighting the increasing reliance on secure HTTPS protocols and the complexities of DNS management. It also delves into the evolving cybersecurity challenges that businesses and individuals face, emphasizing the importance of robust defenses against an array of cyber threats. Additionally, the report explores the technological advancements that are driving the future of the internet, including developments in artificial intelligence, machine learning, and cloud computing.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later