Attack forces name server host to increase security

Feature

Attack forces name server host to increase security

Akamai Technologies said that the Domain Name System problems it encountered were the result of a sophisticated and targeted distributed denial-of-service attack against the company.

Tom Leighton, the company's chief scientist, talked about what happened. 

What was the nature of the attack?

It was a name server attack against four of our customers for whom we carry their name servers. Our assumption was this was an attack against Akamai and it was perpetrated by attacking our customer name service infrastructure. It is not impossible that this was a coordinated attack against those four websites. Akamai has a lot of key customers, and it could just be a coincidence that the four happened to be Akamai customers. But we are assuming it was an attack against Akamai. 

Why were only four major customers affected?

Actually, we had more than those four customers impacted. About 4% of our customer base (of about 1,100 customers) had the potential to be impacted by the attack. Half of them did not have any noticeable impact. There was a set of servers that experienced the brunt of the attack. The servers did not go down, but their ability to perform was severely hampered. They were giving out valid information, but for a small subset of customers, the performance was not there. 

Has the source of the attack been identified and the attack traffic stopped?

That is information that we are sharing with the authorities. But the attack traffic has been eliminated. 

What has happened since the attack?

We have had a chance to analyse the attack. We have put out several additional defensive mechanisms in place because there is a security concern. Going forward, we are continuing to place additional mechanisms in place. DNS is a critical component of the internet and in general one of the most vulnerable.

We have put a lot into securing our name server infrastructure. We have learned from this incident. 

Is there any indication that someone with inside knowledge could have been responsible?

It was sophisticated and very large-scale, but it did not require insider knowledge. We have no reason to believe an insider was involved. 

Could the incident have been caused by an internal technology problem?

Our systems performed normally, as they are designed to perform. It is because of this that it did not impact more of our customer base.

Jaikumar Vijayan writes for Computerworld

Internet hosting firm blames 'global DNS attack' for disruptions >>

Attack was targeted, says Akamai >>


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in June 2004

 

COMMENTS powered by Disqus  //  Commenting policy