Our Recommendation

Saturday, December 18, 2010

Reprisals by pro-WikiLeaks DDoS overstated, says expert (Computerworld)

Computerworld - all titles to the contrary, attacks of hacktivist WikiLeaks against visa, MasterCard, PayPal and others last week were relatively small and disorganized, says one security expert.

"Despite the press attacks received, they were small potatoes,", said Craig Labovitz, Chief Scientist at Arbor Networks in Chelmsford, Massachusetts, and an authority on the security infrastructure of the Internet.

In a long post earlier this week, Labovitz on scale Arbor blog and refinement of the pro-WikiLeaks distributed denial of service attacks (DDoS) to 5 000 in 2010 confirmed DDoS attacks.

Conclusion of the Labovitz: WikiLeaks attacks were "trivial".

"I call it equivalent to strike a French trucker, cyber" Labovitz said in an interview Thursday. "This is certainly not a war, as claimed by some titles. It was a form of protest, but whose collateral damage. »

DDoS attacks aimed at sites owned by Amazon.com, MasterCard, PayPal and the transaction of payment Switzerland firm PostFinance, apparently in retaliation after each end accounts WikiLeaks or shot stopper WikiLeaks services. Similar attacks from Senator Joseph Lieberman (Conn-I) and Sarah Palin, the former Governor of Alaska sites. Both had blown WikiLeaks to release a trove of confidential cables from the u.s. Department of State at the end of last month.

But when Labovitz against these statistics compiled by Arbor - society provides anti-DDoS technologies to approximately 75% of the world - Internet service providers found wanting WikiLeaks campaigns.

Labovitz, tour of the initial attacks that targeted WikiLeaks itself nor later retaliatory strikes were DDoS floods massive or tune application-level attacks.

"The type of queries [application level] LOIC were rudimentary," said Labovitz, referring to a free tool called low orbit Ion Cannon, many pro-WikiLeaks attack used participants. "A sophisticated attack uses order queries, all right API calls bogs in the system. Hacktivist attacks showed no trace of either.

Nor were these massive attacks.

Labovitz said that the attacks of pro-WikiLeaks generated peak on 5Gbit/sec of traffic aimed at targets, although in 50Gbit/sec Arbor followed in several other flood DDoS attacks this year and only a fraction of the almost 70Gbit/sec view larger until 2010 attack.

And while LOIC more than 100,000 copies were downloaded last week, Labovitz said that the Arbor data showed that the maximum number of attackers WikiLeaks simultaneous retaliation is only in the hundreds, not thousands.

"The number of source what ip observed in revenge fallen WikiLeaks late middle attacks" or 5,000 DDoS attacks made Beaver validated last year, he said on the ticket blog.

Labovitz, who suggested that bases tried to recruit large networks of botnets, these collections of compromised computers were not actually used.

But while WikiLeaks attacks were easily blocked by most of the targets, this does not mean attack DDoS are not a serious threat to the Internet.

"The majority of attacks that see us can be treated," said Labovitz, but there are professionals with financial reasons that take a long time and money in very sophisticated DDoS attacks. "He hesitated to assign the precise reasons for such attacks top range, although some, he said, were clear extortion against ISPs and enterprises.

"While the WikiLeaks and reprisal attacks do not represent the beginning of"cyberwar"... the tendency of the militarization of the Internet and used DDoS as means of protest, censorship and attacked political concern," he wrote on the blog of Arbor "DDoS fuelled by the growth of professional opponents, massive Botnets and increasingly more sophisticated attack tools computer networks poses a real danger for the network and our growing dependence on the Internet."

Gregg Keizer covers Microsoft issues security, Apple, Web browsers and General technology breaking news for Computerworld. Follow Gregg on Twitter at Twitter @ gkeizer or you subscribe to flux RSS de Gregg Keizer RSS. Her address is gkeizer@computerworld.com.

Learn more about security in Computerworld security topic Center.

The CIO's New Guide to Design of Global IT InfrastructureIt is possible to eliminate the impact of distance? This article explores the key 5 principles that CIOS successfully is using to reshape IT infrastructure of any size. Learn how to be ready to adapt to your environment in a manner that supports supports distributed employees, anytime, anywhere collaboration and the need for business continuity during a disaster.

Read now.

The Benefits of Cloud ComputingDiscover what Chief Information Officer of BMC Software provides for the future of the cloud.

Read now.

The New Paradigm of Enterprise CommunicationsDiscover how to increase the mobilization of workers and productivity within your company, even in a robust economy. Alcatel-Lucent, article featuring research from Gartner shows how implementing context-sensitive technology can ensure collaboration communication and build a competitive advantage.

Read now.

No comments:

Post a Comment