WASHINGTON, D.C. -- Akamai Technologies continues to study the massive DDoS attacks that brought government websites to a standstill last year. The picture keeps getting uglier, but emergency planning hasn't improved.
At Securitymetrics.org's Metricon 5 event today, R.H. Powell, senior service line manager for the Cambridge, Mass.-based company, revealed new research and suggested companies do better at planning for these increasingly vicious attacks.
Powell has been watching the DDoS trend from a pretty tall vantage point. Most people use Akamai services without even realizing it. The company runs a global platform with thousands of servers customers rely on to do business online. The company currently handles tens of billions of daily Web interactions for such companies as Audi, NBC, and Fujitsu, and organizations like the U.S. Department of Defense and NASDAQ. There's rarely a moment -- if at all -- when an Akamai customer IS NOT under the DDoS gun.
Gleaning data from 200 agent servers whose sole purpose is to listen in on port activity, as well as customer traffic logs and public reports and data from firms such as Forrester Research, Akamai has found, among other things, that:
Powell's assessment mirrors that of his colleague, Akamai CSO Andy Ellis, who told CSO in January that botnets launching many of today's DDoS attacks are so vast that those controlling them probably lost track of how many hijacked machines they control a long time ago. [Listen to the full interview with Ellis in The Long, Strange Evolution of DDoS Attacks]
"We see a lot less of the fire-and-forget malware-based attacks designed to bog down the machines that were infected," Ellis said, referring to old-school worm attacks like Blaster, Mydoom and Code Red. "Now the malware is used to hijack machines for botnets and the botnets themselves are used as the weapon."
In the last year, Akamai has seen some of the largest DDoS attacks in recent memory, which Ellis described as "huge attacks of more than 120 gigabytes per second." If you are on the receiving end of that much punch, Ellis said, "It's not a pleasant place to be."
The massive attack that started July 4, 2009 was a good example of this. In that onslaught, a botnet of some 180,000 hijacked computers hammered U.S. government Web sites and caused headaches for businesses in the U.S. and South Korea. The attack started that Saturday, knocking out websites for the U.S. Federal Trade Commission (FTC) and U.S. Department of Transportation (DOT). US Bancorp, the nation's sixth-largest commercial bank, also took a direct hit.
Powell said the attack lasted a week and generated 64 billion log lines. Without a doubt, he said, it remains the biggest Internet attack Akamai has seen to date.
The only silver lining is that the company hasn't seen a huge amount of attack traffic yet from mobile devices. But, he said, "We are watching and waiting warily."
Powell said Akamai's goal is to get its customers to understand what's happening and do better at blunting the attacks from their own environments.
"We've found that there's still no emergency playbook for dealing with this kind of threat," he said. "We need to change that."