FCC, ISPs Join Forces to Fight Routing Hijacks, Botnets
March 26, 2012 1:51 PM
comment(s) - last by
Coalition will also work to secure DNS servers
Comcast Corp. (
), Time Warner Cable, Inc. (
), AT&T, Inc. (
), Cox Communications, CenturyLink, Inc. (
), Deutsche Telekom AG's (
) subsidiary T-Mobile USA, and Verizon Communications Inc. (
) and Vodafone Group Plc.'s (
) joint cellular venture, Verizon Wireless, at a special meeting in Washington D.C. all agreed to join forces with the
U.S. Federal Communications Commission
Communications, Security, Reliability and Interoperability Council
(CSRIC) in policing the internet.
I. DDOS Blockade -- a Thorny Issue
policing the internet
" is typically associated with the ISPs' volunteer efforts to combat copyright infringement (which in ISP eyes brings legal risks and extra bandwidth use), the new effort deals with fighting aggressors who look to exploit routing to destructive ends.
One issue the coalition will look to combat is botnets. A botnet is formed when malware infects thousands of computers, giving a
distributed platform controlled from a central command and control (CnC) server
. A botnet is a powerful tool. A large botnet can
take down many webpages
simply by ordering all its controlled machines to visit the target page, overloading it with traffic. At the same time, they can be employed in more sophisticated for-profit crime, such as
sending spam email
Microsoft Corp. (
) has joined with law enforcement to
take down several top botnets
in the last year. Its approach has focused on "decapitating" the botnet by locating and killing the CnC server. But many feel that ISPs could help cut off the greater body of botnets at their source, given that they have access to data that could be used to identify and target solutions at infected machines.
Together the ISPs and feds have crafted a guiding document titled "Anti-Bot Code of Conduct."
With regard to distributed denial of service (DDOS) attacks, where things could get interesting is in the case where individual non-infected users commit a mass attack. In such cases the attack can closely resemble a botnet-driven DDOS attack. In such a case ISPs could step in and kill the attackers' internet connections -- either thinking or claiming them to be part of a botnet.
New policies could make it harder for
to engage in DDOS webpage takedowns.
[Image Source: Jason Mick/DailyTech]
While many would feel that cutting off
this weapon used by
and others would be a great thing, others feel that eliminating non-malware DDOS campaigns would be akin to
silencing public protest
. Some view DDOS attacks by users as a digital equivalent of a sit-in/strike and view countermeasures as totalitarian.
II. Protecting DNS, Fighting Routing Hijacks
A second issue considered by the coalition is routing hijacks. The issue gained notice when millions of connections were
"accidentally" routed through Chinese servers
last year. While China claimed it was an innocent glitch, some saw it as a concerted hijacking effort. By redirecting traffic through its servers, an aggressor nation could potentially glean valuable bits of intelligence, by decreasing its difficulty in intercepting conversations. While sophisticated secure channels typically keep track of the delay between connections and thus would shut off in such a scenario, such loss of secure links could prove almost as bad as their compromise.
Bundled with the second issue is the third issue of
vulnerabilities to the domain name system (DNS)
, the databases that associate websites' text-string URL representation with specific numeric internet protocol addresses. Domain hijacking via DNS attacks remains a popular method of hacking, and in some cases hackers have taken down entire DNS server blocks.
Domain hijacking and traffic rerouting can raise serious threats to national security online. [Image Source: Chris Woebken/Flickr]
The FCC and some others have advocated a new protocol dubbed DNSSEC ("Domain Name System Security Extensions"), but the coalition shied away from accepting that effort. The key point of contention is that the new protocol would expose all the domains within a particular host, which would give attackers a virtual laundry list of who to attack.
Standards committees are working to address this major security flaw, but a robust solution has not yet been fully realized.
In the meantime, the coalition hopes to push browser-makers to do a better job monitoring DNS antics, and protecting users from visiting known hostile domains.
Together, the ISPs and FCC's DNS/routing pact is dubbed "the DNS code of conduct".
The two pacts are not without their controversies (most notably, the possibility of the anti-botnet provisions being used as a tool to suppress public protest via DDOS). However, for the average user, these efforts may help cut your spam burden and cut down on the danger of getting your system unwitting hijacked.
FCC [press release]
[meeting notice; PDF]
This article is over a month old, voting and posting comments is disabled
Here's a good idea
3/26/2012 2:23:43 PM
Shut down IRC. I realize this will anger all the people out there with neck beards and hygiene issues, but who cares about them?
RE: Here's a good idea
3/26/2012 3:24:24 PM
If you think this will stop groups like anonymous or lulzsec think again. Some tech companies such as Linode use IRC for their community support channel.
I used to think it was basically useless until I needed some help. Poped right in and found about 20 people willing to help me with an issue I had. Ended up walking away with more knowledge on why it wasn't working and how to fix it because of these individuals.
RE: Here's a good idea
3/29/2012 5:59:23 PM
Exactly, IRC is used for a hell of a lot more than warez and cracking. See irc.freenode.net, which has support channels for just about every opensource project there is.
Now, arguing for shutting down warez/cracking centric irc servers like efnet wouldn't be as stupid, but I still wouldn't agree.
"Spreading the rumors, it's very easy because the people who write about Apple want that story, and you can claim its credible because you spoke to someone at Apple." -- Investment guru Jim Cramer
Verizon, TWC, and Comcast to Play "Copyright Cop" for the RIAA
March 16, 2012, 12:31 PM
Megaupload is Megapwned by Gov't, Anonymous Hits Back, Downs DOJ Homepage
January 19, 2012, 9:34 PM
New York Stock Exchange Hack Attack Fizzles
October 11, 2011, 9:35 AM
GPU Roaring? You May Be Infected With a Bitcoin Trojan Says Symantec
August 17, 2011, 4:47 PM
Microsoft Says Any Botnet Can be Decapitated, Destroyed
July 10, 2011, 2:20 PM
Facebook CEO Called President Barack Obama to Complain About NSA Spying
March 14, 2014, 1:40 PM
Quick Note: Google Drive 100GB, 1TB Plans See Major Price Cuts
March 13, 2014, 2:45 PM
Target Missed Early Warning Signs of Holiday Data Breach
March 13, 2014, 1:45 PM
Amazon Increases Prime Subscription to $99/year Starting March 19
March 13, 2014, 8:23 AM
Bitcoin King's American Accounts Get Frozen
March 13, 2014, 3:00 AM
Time Warner Cable CEO Says Merger with Comcast is a "Dream Combination", Will Increase Innovation
March 12, 2014, 2:37 PM
Most Popular Articles
Bitcoin King Pt. II: Mt. Gox's Dictator Karpelès Proves Tragically Flawed
March 7, 2014, 1:12 PM
Hack Reveals Fallen Bitcoin CEO's Posh Tokyo Penthouse
March 10, 2014, 4:28 PM
Tesla Motors Calls New Jersey Out on New Rule Against Its Direct Sales Model
March 11, 2014, 12:01 PM
NASA Considering SpaceX "Red Dragon" for Returning Mars Samples to Earth
March 10, 2014, 2:43 PM
India Could Rock Google With Its Biggest Antitrust Fine Yet -- $5B USD
March 10, 2014, 8:12 PM
Latest Blog Posts
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
Is The Period Becoming an Expression of Anger?
Nov 26, 2013, 2:02 PM
NSA and Congress -- You Will Never Kill the Constitution, It's an Idea
Nov 10, 2013, 2:00 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information