EuropeSouth AsiaAsia PacificAmericasMiddle EastAfricaBBC HomepageWorld ServiceEducation
BBC Homepagelow graphics version | feedback | help
BBC News Online
 You are in: Business
Front Page 
World 
UK 
UK Politics 
Business 
Market Data 
Economy 
Companies 
E-Commerce 
Your Money 
Business Basics 
Sci/Tech 
Health 
Education 
Sport 
Entertainment 
Talking Point 
In Depth 
AudioVideo 

News image
News image
News imageInternet Security Systems' Mark Sokol
"It's hard to implement adequate securities and controls"
News image real 28k
News image
Thursday, 10 February, 2000, 05:38 GMT
How the web was wounded

Yahoo: Hit with a year's worth of data per second


The spate of electronic assaults on high-profile websites has illustrated just how vulnerable to attack even the internet's biggest names are.

In each case the online saboteurs have bombarded their victims' sites with vast amounts of data making it impossible for legitimate users to get through.

Yahoo's site ground to a halt after it was pounded with one gigabit - or one billion bits of information - per second.

"Most sites don't get that in a year," said the company's spokeswoman Diane Hunt. "That's an incredible amount."


Amazon.com: Targeted for attack
This technique, known as a "denial of service attack", could be likened to repeatedly auto-dialling a phone number so that all that other callers get is an engaged tone.

In the past few days it has been successfully used to temporarily cripple several of the world's most popular commercial websites.

As well as Yahoo the victims have included Amazon.com - the company that has probably done more than any other to overcome public mistrust of online transactions, paving the way for the explosion in e-commerce.

All of the targeted firms have been keen to stress that none of their customers' details, such as credit card numbers, have been accessed by their faceless foes.

But downloading such information does not appear to have been the plan.

By making it impossible for online transactions to take place, a successful attack deprives a company of revenue.

A site's credibility with the public and investors is also likely to be damaged if it is so easily brought to its knees by an unseen assailant.

Zombies beware

Perpetrators of such attacks usually force unsuspecting third parties to be their accomplices in this, the very 21st Century version of industrial sabotage.

The junk data is sent through "zombie" machines, innocent computer systems which have been "cracked" by a single person or group of people from a remote location.


mouse The attackers can tap into dozens of innocent computer systems to launch an attack
In the case of the attack on Yahoo it is believed that about 50 powerful computers were hacked across the United States.

These "zombies" were then simultaneously instructed to send falsified data to "routers" on the internet that, in turn, were fooled into flooding the Yahoo site.

The saboteurs can avoid detection by jumping from one computer network to another to cover their tracks, and by immediately erasing any data that might identify them.

Christopher Klaus, chief technology officer of Internet Security Systems Inc a company which tries to combat such online thuggery says this makes it difficult to identify who is really behind a denial of service attack.

"The problem is to find the command centre that's controlling all of the machines," he said.

"This is a non-trivial problem."

Best defence?

So what can websites do to defend themselves against such tactics.

In the extreme short term the answer may be not very much.


News image
The whole industry is moving so fast it's hard to implement adequate securities and controls.News image
Internet Security Systems' Mark Sokol
It can take several hours for technicians to identify an attack and put filters into action to block the junk messages.

By then damage has already been done

Mark Sokol of Internet Security Systems says that to an extent such problems go with the territory.

"The whole industry is moving so fast it's hard to implement adequate securities and controls.

"Which is one of the reasons in order to circumvent these type of risks it is essential for an organisation to implement best practices and controls as well as a have a process in place, of preparedness, for an incident."

News imageSearch BBC News Online
News image
News image
News imageNews image
Advanced search options
News image
Launch console
News image
News image
News imageBBC RADIO NEWS
News image
News image
News imageBBC ONE TV NEWS
News image
News image
News imageWORLD NEWS SUMMARY
News image
News image
News image
News image
News imageNews imageNews imageNews imagePROGRAMMES GUIDE
News imageNews image

See also:
News image
News image 09 Feb 00 |  Business
News image FBI targets net saboteurs
News image
News image 08 Feb 00 |  Sci/Tech
News image Yahoo brought to standstill
News image
News image 08 Feb 00 |  Sci/Tech
News image Yahoo attack exposes web weakness
News image

Internet links:

The BBC is not responsible for the content of external internet sites
News image
Links to other Business stories are at the foot of the page.
News image

E-mail this story to a friend

Links to more Business stories



News imageNews image