Net's Vulnerability Exposed
Attack on root servers resulted in moderate damage - this time
Computerworld - Last week's assault on the Internet's core addressing system may not have caused much real damage, but it highlights the Internet's vulnerability to more sophisticated cyberattacks in the future, security analysts warned.
All 13 of the Internet's root Domain Name System serversthree of which are located outside the U.S.were victims of a massive distributed denial-of-service attack on Oct. 21.
"It was the single most elaborate and focused attack on the DNS network that we have ever seen," said Tom Ohlsson, vice president of Matrix NetSystems Inc., an Austin, Texas-based Internet performance monitoring company.
The attack appears to have been an attempt to disrupt the Internet by clogging root DNS servers with useless traffic. The root DNS servers provide the vital translation services needed for converting a Web name such as www.computerworld.com into a corresponding numerical IP address.
But overall Internet service appears to have been largely unscathed, with few major disruptions reported, Ohlsson noted.
That's because most of the information contained in the 13 root DNS servers is cached in redundant and hierarchical fashion across multiple secondary DNS servers.
"On the plus side, this shows that despite all those apocalyptic projections, the Internet is more resilient than people think," said John Pescatore, an analyst at Gartner Inc. in Stamford, Conn. "But it also shows that the basic plumbing of the Internet still has vulnerabilities that need to be addressed or brought up to business-quality levels."
The relatively simply nature of last week's DDOS attack is what made it easy for administrators to detect and choke off the offending traffic in a few hours, analysts said.
But service would have started degrading if the attack had been sustained long enough for the information contained in the secondary DNS caches to start expiringa process that usually takes from a few hours to about two days, analysts added.
"This wasn't exactly the most sophisticated attack in the world," said Jerry Brady, chief technology officer at Guardent Inc., a security consultancy in Waltham, Mass. "But I've got to believe that this is going to inspire a lot more attacks like this in future."
In a DDOS attack, hackers typically break into and take over thousands of poorly protected networked computersincluding those in homesand use such "zombies" to send torrents of useless data at target servers or networks.
"It is the electronic equivalent of somehow getting 50,000 phones to dial 911 at the same time," said Mark D. Rasch, former head of the U.S. Department of Justice's computer crimes unit and currently senior vice president and chief security counsel at Solutionary Inc.
The Internet Corporation for Assigned Names and Numbers (ICANN), the private group that's charged with ensuring the stability and security of the DNS, will discuss methods for improving DNS security at its annual meeting next week in Shanghai.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts