EDGE 2015 is starting in

Find out more EDGE 2015
Menu
Spamhaus attack highlights “fragility of the Internet:” IIA

Spamhaus attack highlights “fragility of the Internet:” IIA

IT industry group sees recent DDoS attack as being a wake up call to the limitations of the Internet

Internet spam filter provider, Spamhaus, has been hit by a DDoS (Distributed Denial of Service) attack, and the Internet Industry Association (IIA) sees it as a sign of how volatile the Internet really is.

What the Spamhaus attackers did in this case was target Internet Exchanges (IXs) to create congestion at key points of the Internet.

Akamai Technologies Asia-Pacific and Japan enterprise security director, John Ellis, said these attacks were designed to “suffocate” the networks at the IXs.

“The Internet is an inter-network of separately managed networks, connected together through a series of hierarchal relationships between network providers,” he said.

Ellis added that the Spamhaus attackers knew these relationships and targeted the upstream network providers after initial efforts to disrupt the availability of the Spamhaus website failed.

Whilst the Internet Exchanges were able to reroute around the congestion points, users still experienced performance issues using the Internet.

IIA CEO, Peter Lee, said he sees this attack as emblematic of the additional vulnerabilities that can be found in the design and implementations of networks on the Internet.

"This not only highlights the need for service providers to be vigilant in relation to their core Internet server security, but also the importance of initiatives such as the IIA icode,” he said.

The icode Lee refers to provides a mechanism for ISPs to alert customers in the event an attack results in the dissemination of malware that may affect a device.

DDoS attacks are becoming increasingly common in targeting selected websites and servers by employing huge volumes of traffic to grind servers to a halt.

While there have been no direct reports of this attack having a direct impact on Australian Internet users, Akamai Technologies foresees home users experiencing slower Internet or receive unwanted emails as part of the attack.

Patrick Budmar covers consumer and enterprise technology breaking news for IDG Communications. Follow Patrick on Twitter at @patrick_budmar.

EDGE 2015:: For all the latest on EDGE 2015 including the keynote speakers visit the EDGE mini-site now

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags DDoS attacksakamaiIIA

Upcoming

Slideshows

In Pictures: 7 things we hate about Twitter

In Pictures: 7 things we hate about Twitter

You probably either love Twitter for its quirkiness and brevity or see it as a pointless waste of time. After nearly a decade on the social scene, Twitter still needs to improve its user experience and fill in notable gaps in the service. These seven problems are long overdue for a fix.

In Pictures: 7 things we hate about Twitter
IN PICTURES: EDGE 2015 - Sponsor Briefing

IN PICTURES: EDGE 2015 - Sponsor Briefing

With EDGE 2015 rapidly approaching, ARN and Reseller News NZ held a Sponsors Briefing where ARN publisher and president, Susan Searle, and Events Manager, Alexandra West, ran through the considerable logistics in detail. Attendees then enjoyed some splendid canapes and drinks. EDGE is designed to bring the A/NZ channel together in a collaborative and educational environment. Themed around channel channel leadership, EDGE will be held at the Sheraton Mirage, Port Douglas, July 20-23. Photos by MIKE GEE.

IN PICTURES: EDGE 2015 - Sponsor Briefing
In Pictures: Robots that cook, clean, sing and dance

In Pictures: Robots that cook, clean, sing and dance

Cooking, learning language and doing the laundry are a few of the human skills demonstrated by.real humanoid bots featured in the National Geographic movie Robots.

In Pictures: Robots that cook, clean, sing and dance

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments