Denial-of-service attacks on the rise?
By Jaikumar Vijayan
(IDG) -- Denial-of-service (DoS) attacks continue to present a significant security threat to corporations two years after a spate of incidents brought down several high-profile sites, including those of Yahoo! Inc. and eBay Inc., users and analysts report.
Since then, several technologies have emerged that help users detect and respond to DoS attacks far more quickly and effectively than before. But the increasingly sophisticated attack methods and the growing range of systems targeted in DoS attacks continue to pose a challenge. "In that sense, the tools are always only trying to catch up" with the threat, said Raj Raghavan, a vice president at SiegeWorks Enterprise Security Solutions, a Pleasanton, California-based integrator of security technologies.
DoS attacks make computer systems inaccessible by flooding servers or networks with useless traffic so that legitimate users can no longer gain access to those resources. In distributed DoS (DDoS) attacks, malicious hackers use hundreds and sometimes even thousands of previously compromised computer systems to launch assaults against a network or server.
During a three-week period in mid-2001, researchers from the University of California, San Diego, detected approximately 12,800 DoS attacks against more than 5,000 targets. Recent examples include attacks against the World Economic Forum's Web site in February as well as those that drove British Internet service provider CloudNine Communications out of business earlier this year.
"The threat is a lot worse today than two years ago," said Harris Miller, president of the Information Technology Association of America (ITAA) in Arlington, Virginia. "There are lots of indications that since September 11, the number of DoS attacks have greatly increased."
The ITAA is acting as the coordinator of an industry body called the IT Information Sharing and Analysis Center, which was created early last year to share information and find ways of dealing with DoS and other security threats.
Part of the problem with DoS attacks is the sheer number of ways in which they can operate, said Pete Lindstrom, an analyst at Framingham, Massachusetts-based Hurwitz Group Inc. A DoS attack can be launched to overwhelm a target's Web site, CPU, memory, network bandwidth or routers. It can also work by taking advantage of known flaws in products, Lindstrom said.
Degradation-of-service attacks are another variation. Such assaults, which are more difficult to detect than other DoS attacks, involve short-lived bursts of spurious traffic directed at a target from multiple sources and are aimed at slowing network performance.
"It would be a fairly straightforward issue to handle if such attacks originated and terminated with the same network," said Jeff Ogden, director of high-performance networks at Ann Arbor, Michigan-based Internet service provider Merit Network Inc.
The problem arises because almost all DoS attacks involve multiple networks and attack sources, many of which have spoofed IP addresses to make detection even harder, according to Ogden.
So completely choking off the offending traffic requires network administrators to call upstream service providers, alerting them to the attack and having them shut down the traffic. That process has to be repeated all the way back to every attack source.
Report: Worms overtake DoS as top attacks
April 5, 2002
Denial-of-service attacks expected
November 7, 2001
NIPC warns of possible DDoS attacks
September 19, 2001
Study: Nearly 4,000 DoS attacks occur per week
May 24, 2001
RELATED IDG.net STORIES:
Costs, other priorities stall use of DoS detection/response tools
ISS: Worms overtake DoS as top attacks in 2002
Server port 80 plagues Internet security
Companies, colleges fail computer security
Security in a world without secrets
Are Web sites as secure as they seem?
FBI hints at dismantling NIPC
Bug-reporting standard proposal pulled from IETF
Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.
TECHNOLOGY TOP STORIES:
Report: SUVs pose danger to cars
New telemarketer tool trumps TeleZapper
Terra Lycos logs $2.2B loss
AOL to offer song downloads
Microsoft seeks fiscal fountain of youth
|Back to the top|