FCC, ISPs Join Forces to Fight Routing Hijacks, Botnets
March 26, 2012 1:51 PM
comment(s) - last by
Coalition will also work to secure DNS servers
Comcast Corp. (
), Time Warner Cable, Inc. (
), AT&T, Inc. (
), Cox Communications, CenturyLink, Inc. (
), Deutsche Telekom AG's (
) subsidiary T-Mobile USA, and Verizon Communications Inc. (
) and Vodafone Group Plc.'s (
) joint cellular venture, Verizon Wireless, at a special meeting in Washington D.C. all agreed to join forces with the
U.S. Federal Communications Commission
Communications, Security, Reliability and Interoperability Council
(CSRIC) in policing the internet.
I. DDOS Blockade -- a Thorny Issue
policing the internet
" is typically associated with the ISPs' volunteer efforts to combat copyright infringement (which in ISP eyes brings legal risks and extra bandwidth use), the new effort deals with fighting aggressors who look to exploit routing to destructive ends.
One issue the coalition will look to combat is botnets. A botnet is formed when malware infects thousands of computers, giving a
distributed platform controlled from a central command and control (CnC) server
. A botnet is a powerful tool. A large botnet can
take down many webpages
simply by ordering all its controlled machines to visit the target page, overloading it with traffic. At the same time, they can be employed in more sophisticated for-profit crime, such as
sending spam email
Microsoft Corp. (
) has joined with law enforcement to
take down several top botnets
in the last year. Its approach has focused on "decapitating" the botnet by locating and killing the CnC server. But many feel that ISPs could help cut off the greater body of botnets at their source, given that they have access to data that could be used to identify and target solutions at infected machines.
Together the ISPs and feds have crafted a guiding document titled "Anti-Bot Code of Conduct."
With regard to distributed denial of service (DDOS) attacks, where things could get interesting is in the case where individual non-infected users commit a mass attack. In such cases the attack can closely resemble a botnet-driven DDOS attack. In such a case ISPs could step in and kill the attackers' internet connections -- either thinking or claiming them to be part of a botnet.
New policies could make it harder for
to engage in DDOS webpage takedowns.
[Image Source: Jason Mick/DailyTech]
While many would feel that cutting off
this weapon used by
and others would be a great thing, others feel that eliminating non-malware DDOS campaigns would be akin to
silencing public protest
. Some view DDOS attacks by users as a digital equivalent of a sit-in/strike and view countermeasures as totalitarian.
II. Protecting DNS, Fighting Routing Hijacks
A second issue considered by the coalition is routing hijacks. The issue gained notice when millions of connections were
"accidentally" routed through Chinese servers
last year. While China claimed it was an innocent glitch, some saw it as a concerted hijacking effort. By redirecting traffic through its servers, an aggressor nation could potentially glean valuable bits of intelligence, by decreasing its difficulty in intercepting conversations. While sophisticated secure channels typically keep track of the delay between connections and thus would shut off in such a scenario, such loss of secure links could prove almost as bad as their compromise.
Bundled with the second issue is the third issue of
vulnerabilities to the domain name system (DNS)
, the databases that associate websites' text-string URL representation with specific numeric internet protocol addresses. Domain hijacking via DNS attacks remains a popular method of hacking, and in some cases hackers have taken down entire DNS server blocks.
Domain hijacking and traffic rerouting can raise serious threats to national security online. [Image Source: Chris Woebken/Flickr]
The FCC and some others have advocated a new protocol dubbed DNSSEC ("Domain Name System Security Extensions"), but the coalition shied away from accepting that effort. The key point of contention is that the new protocol would expose all the domains within a particular host, which would give attackers a virtual laundry list of who to attack.
Standards committees are working to address this major security flaw, but a robust solution has not yet been fully realized.
In the meantime, the coalition hopes to push browser-makers to do a better job monitoring DNS antics, and protecting users from visiting known hostile domains.
Together, the ISPs and FCC's DNS/routing pact is dubbed "the DNS code of conduct".
The two pacts are not without their controversies (most notably, the possibility of the anti-botnet provisions being used as a tool to suppress public protest via DDOS). However, for the average user, these efforts may help cut your spam burden and cut down on the danger of getting your system unwitting hijacked.
FCC [press release]
[meeting notice; PDF]
This article is over a month old, voting and posting comments is disabled
Here's a good idea
3/26/2012 2:23:43 PM
Shut down IRC. I realize this will anger all the people out there with neck beards and hygiene issues, but who cares about them?
RE: Here's a good idea
3/26/2012 3:24:24 PM
If you think this will stop groups like anonymous or lulzsec think again. Some tech companies such as Linode use IRC for their community support channel.
I used to think it was basically useless until I needed some help. Poped right in and found about 20 people willing to help me with an issue I had. Ended up walking away with more knowledge on why it wasn't working and how to fix it because of these individuals.
RE: Here's a good idea
3/29/2012 5:59:23 PM
Exactly, IRC is used for a hell of a lot more than warez and cracking. See irc.freenode.net, which has support channels for just about every opensource project there is.
Now, arguing for shutting down warez/cracking centric irc servers like efnet wouldn't be as stupid, but I still wouldn't agree.
"We’re Apple. We don’t wear suits. We don’t even own suits." -- Apple CEO Steve Jobs
Walmart to Sell New iPads Starting at Midnight, iFixit Disassembles the New Tablet
March 15, 2012, 4:42 PM
Megaupload is Megapwned by Gov't, Anonymous Hits Back, Downs DOJ Homepage
January 19, 2012, 9:34 PM
New York Stock Exchange Hack Attack Fizzles
October 11, 2011, 9:35 AM
GPU Roaring? You May Be Infected With a Bitcoin Trojan Says Symantec
August 17, 2011, 4:47 PM
Running on Empty: U.S. Defense Desperate for Biofuels
July 11, 2011, 10:31 AM
Google Knocked by Analysts, But Shows Strokes of Brilliance in Q1 2014
April 18, 2014, 2:33 PM
Google Street View and reCAPTCHA Get Smarter with New Algorithm
April 17, 2014, 9:02 AM
Mt. Gox CEO Refuses to Come to the U.S. in Financial Crimes Probe
April 16, 2014, 3:50 PM
Mark Zuckerberg: Facebook Home Reception Slower than Expected, Social Graph Will Pick Up
April 16, 2014, 2:00 PM
FBI's Facial Recognition Database to Have 52 Million Criminal, Non-Criminal Photos by 2015
April 15, 2014, 2:56 PM
Microsoft's Anti-Google "Scroogled" Campaign May Have Ended
April 15, 2014, 2:44 PM
Most Popular Articles
Cities to Carpoolers: Sharing Your Car is Illegal, We Will Seize Your Cars
April 4, 2014, 9:17 PM
iPad Exploiter is Freed by Federal Appeals Court
April 11, 2014, 7:40 PM
A-10 Warthog May Live to Fight Another Day with Support from Lawmakers
April 14, 2014, 9:41 AM
Taiwan's AOU Claims to Have World's Highest-Res. OLED Smartphone Display
April 11, 2014, 1:44 PM
EFF: NSA May Have Used IRC Botnets to Exploit Heartbleed for Last Two Years
April 14, 2014, 4:43 PM
Latest Blog Posts
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information