China did not hijack 15% of the Net, counters researcher
Routes versus traffic confuses media, says expert
Computerworld - Talk that China hijacked 15% of the Internet earlier this year is overblown, a researcher said today.
"There's been some confusion over routing versus traffic," Craig Labovitz, chief scientist at Arbor Networks, said in an interview today. "While maybe 10% to 15% of the routes to other peers may have been diverted, a lot of those routes didn't propagate."
Instead of the widely-reported 15%, Labovitz estimated that the actual amount of Internet traffic affected by the April 2010 incident was much lower, on the order of just 0.015%.
Labowitz was reacting to media reports, many of which he said got it wrong, on the disclosure this week by the U.S.-China Economic and Security Review Commission that for 18 minutes on April 8, a significant portion of the Internet's destinations were routed through servers belonging to China Telecom.
The Commissions' report to Congress noted that the route redirection had affected U.S. government and military networks, as well as major U.S. commercial sites such as Microsoft's and Dell's.
"China Telecom advertised erroneous network traffic routes that instructed U.S. and other foreign Internet traffic to travel through Chinese servers," the report stated. "Other servers around the world quickly adopted these paths, routing all traffic to about 15% of the Internet's destinations through servers located in China."
But routes do not equal traffic, argued Labovitz.
"Think of it like a telephone book," said Labovitz. "A telephone book could have millions of phone numbers. Say 15% of those numbers are corrupted. But you have to ask how widely were those [corrupted] telephone books distributed."
Based on data from Arbor Networks' ATLAS (Active Threat Level Analysis System), Labovitz said that the amount of traffic through the hijacked routes was much, much smaller than 15%.
"There was no statistically significant increase in traffic [through China Telecom] due to the hijack," said Labowitz. "Most of the re-routing [propagation] didn't make it very far."
The Internet relies on a routing system where numerous servers exchange information with each other to determine the best path for traffic to take to a specific URL. The protocol that decides such routing is called Border Gateway Protocol, or BGP.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts