The Strength of the Internet Proves to Be Its Weakness
By JOHN MARKOFF
SAN
FRANCISCO, Feb. 9 -- The Internet's greatest
strength has proved to be its most disturbing
weakness.
As attackers let loose a
barrage of data that
overwhelmed some major commercial
Internet sites for
a third day, the global
network's administrators
scrambled today to find
a way to protect it and trace the
culprits.
But the network's
| How the Sites Were Besieged
The attacks that overwhelmed several big Internet sites in the last few days used a method called distributed denial of service. THE ATTACKER
THE NETWORK
THE ASSAULT
Source: Computer Emergency Response Team |
designers
acknowledged that the
attacks exploited the
same attributes of the
Internet that have
made it one of the
world's most effective
engines for
commercial and
technical innovation
over the last five
years.
"This is a fundamental
consequence of an
open system," said
Lawrence Lessig, a
Harvard law
professor who has
written on the
Internet's social and
legal aspects.
Unlike recent episodes in
which Web sites were
defaced or credit card records
were taken from an
online music retailer, this
week's attacks have not
involved stolen or altered
data. But in a world of
growing dependence on the
Internet, even being denied
access to an Internet web
site like E*Trade can have an
economic impact.
Indeed, Internet veterans
muse about potential technical
disasters in an increasingly
interconnected world. What
has been seen so far is
not the Internet's Armageddon,
they say, but only an alert.
"There are nightmare scenarios
that are real, but that's
not where we are," said
David Clark, an M.I.T.
professor who was one of
the Internet's original
designers.
Even so, finding ways to
contain anti-social acts in
such a system -- one that
by its very design permits
anonymous behavior -- without
compromising its
openness is proving increasingly
thorny for network
designers, law enforcement
officials and civil
libertarians.
"We have run into a situation
where the attackers are
coordinated and organized
but the people who have to
respond -- both companies,
Internet service providers,
and most particularly law
enforcement agencies -- are
fragmented," said Mark Rasch,
a former United States
federal prosecutor who is
currently a vice president at
Global Integrity, a computer
security consulting firm
based in Reston, Va.
This week's attacks have
exploited a set of software
programs developed over
the last year, computer
security experts said today.
Known variously as Tribe
Flood Network, Trin00 and
Stacheldraht (German for
"barbed wire"), the programs
first identify individual
computers on the Internet
with specific security flaws,
then use those computers
as launching pads for an
orchestrated attack.
Like the sorcerer's apprentice,
the programs allow a
small group or even an individual
to spray a giant
firehose of data at one
or many targets, inundating a
Web site's computers with
data.
Moreover, it is not easy
to identify the person holding
the hose. In some cases,
the malicious programs
systematically falsify the
network addresses from
which the data is sent.
But while the
consequences of these
programs are harmful,
it is just this kind of
novel intervention that
the Internet was
designed to make
possible.
In the early 1980's,
Mr. Clark and two
other M.I.T. computer
network researchers,
Jerry Salzer and
David P. Reed, first
described one of the
Internet's most
powerful aspects: that
it was a simple
network -- or even a
"stupid" one, as it
was later described
by David Isenberg,
then an A.T.& T. Bell
Labs researcher -- in
contrast to the more
centralized, or
"intelligent," and
tightly controlled
telephone network.
The very simplicity of
the Internet, they
wrote, made it a platform
for innovation in ways that a
more centralized and tightly
controlled network could
never become.
Over the last decade the
Internet has served as a virtual
petri dish for new ideas
-- from low-cost
communications systems that
have redefined telephone,
radio and television, to
business methods that have
remade industries like stock
trading, auctions and
bookselling.
But that same power for innovation
can be redirected
upon the data network that
is simultaneously
remarkably resilient as
well as extremely vulnerable.
"If a network owner of a
specific network wants to add
some kind of cool feature
it doesn't matter in an
internetworked world," said
Mr. Isenberg.
Because there is no central
point of control, as on other
networks, "you have the
control way out on the edges,
and anyone can do anything,"
he added.
Other Internet pioneers are
concerned that incidents
like this week's attacks
may lead to increasing calls for
government and law enforcement
intervention into the
structure of the Internet.
Last July, for example, the
Clinton administration began
circulating a plan for an
extensive software system
monitoring government computers,
and possibly those
of private industry, to
protect data networks from
intruders.
The network, known as the
Federal Intrusion Detection
Network, or Fidnet, alarmed
civil libertarians who said
it could potentially be
used to curtail privacy in the
Internet age.
"The real danger of any terrorism
is not so much in the
act itself as the overreaction,"
said Robert Frankston, a
computer researcher who
is the co-inventor of the
spreadsheet. "The Internet
has enabled rapid economic
growth because it has made
it difficult to prevent
disruptive innovation."
And he suggested that the
Internet becomes more secure
as it experiences attacks
and its administrators
reconfigure it to repel
invaders -- "just as our immune
system is strengthened by
exposure to disease."
In any case, some veteran
law enforcement officials
said there was no simple
centralized solution to these
kinds of attack.
"The problem is that if you're
smart about this there is
no trail for law enforcement
to follow," said Scott
Charney, who until recently
was the Justice
Department's top computer
crime official and who is
now a partner at Price Waterhouse.
"There are obvious
privacy implications. The
real question is how strong a
response do you want."
The best response, several
computer security experts
said, will be to strengthen
the security of individual
computers on the Internet.
That would make it more
difficult for the automated
programs that now take over
many systems to find systems
to exploit.
------------------
By MICHAEL BRICK and KEVIN
MAX
NYTimes.com/TheStreet.com,
7:46 p.m.
The ease, accessibility and
convenience of the Internet
has rapidly changed the
way Americans read, shop and
invest. But a series of
attacks that disrupted several
popular Web sites this week
left even the businesses
that provide Internet service
confused and raised more
questions than answers.
As the FBI confronts a long,
laborious investigation,
several companies declined
to discuss their security
precautions in detail. Public
relations officials at other
companies simply handed
the telephone over to their
software engineers.
While hacking is not a new
phenomenon, the
denial-of-service attacks,
comparable to intentionally
clogging a telephone line,
drew more widespread
attention to online vulnerability
than ever before.
Internet service providers
began discussing ways to
prevent the problems, but
no definitive plans had been
made, said Secret Fenton,
a spokeswoman for Global
Center, the Internet service
provider that stores the data
of Yahoo! , the first Web
site to be attacked this week.
The company has determined
the cause of Monday's
disruption of Yahoo!, but
what it has learned shows that
the FBI's job -- finding
the culprit or culprits -- will be
a daunting task. A Yahoo!
spokeswoman confirmed
Global Center's account.
The attacker or attackers
sent a flood of information
requests known as pings
to Yahoo!, according to
Fenton. The requests essentially
ask the computers
storing Yahoo! data whether
they are available to
exchange information. The
type of request falls under
the category of Internet
control message protocol, or
ICMP, normally used to check
status.
The requests were sent to
Yahoo! indirectly. The
attacker or attackers actually
sent a flood of requests
through networks that fraudulently
listed Yahoo! as a
return address.
While this cripples the server's
ability to deliver Web
pages, it doesn't violate
the integrity of the system or
allow access to data stored
on the server. As such,
these attacks don't threaten
such sensitive data like
credit card numbers and
other personal information.
The ICMP requests can be
distinguished from
legitimate attempts to log
on to the company's Web site,
Fenton said. In the case
of Yahoo!, the requests were
received at a rate of one
gigabyte per second,
representing more traffic
than some of the top-50 Web
sites receive in a year,
according to Shannon Stubo, the
Yahoo! spokeswoman.
Fenton said the requests
came from about half of the
other service providers
that carry data transmissions to
Global Center.
Stubo said about 50 service
providers carried bogus
requests to Yahoo!.
That means it is possible
that one person built software
that commanded many different
computers, using many
different service providers
in many different
geographic areas. It is
also theoretically possible that
millions of people simultaneously
sent the malignant
information requests.
"It was just coming from
everywhere," Fenton said.
"That's why it's so hard
to trace. I don't think anybody
knows."
The FBI contacted Yahoo!
on Tuesday and the company
is cooperating with the
investigation, Stubo said. The
company has software that
can separate the bogus
requests from real requests
to access the site, she said.
Fenton said Internet service
providers discussed using
rate-limitation devices,
the routers that accept
electronic requests, to
monitor the volume of requests
and halt incoming requests
when the volume becomes
too great. Global Center
has not experienced problems
with other clients.
While Global Center has installed
rate-limitation
devices since the Yahoo
shutdown, it is impossible to
know whether they are helping
prevent attacks, she
said.
"The denial-of-service attacks
happen quite
frequently," Fenton said.
"They just don't happen to this
magnitude."
Some security experts said
Wednesday's attackers
could be copycats, and opinion
varied on how many
people would be needed to
carry out one attack.
Software could be written
to link computers together to
simultaneously send requests,
or hundreds of people
could be sending multiple
requests.
"Yahoo! likely had a million
legitimate hits," said
Jeffrey Bedser, managing
director of Internet Crimes
Group Inc., a Princeton,
N.J., Internet investigation
firm. The information requests
are "not that difficult to
send through anonymous proxies."
Each electronic request for
data can be multiplied 225
times, and the return address
of the request can be made
to appear as the victim's
own address.
"These hackers have the power
to leverage almost
unlimited bandwidth," said
Chris Rouland, an executive
at Internet Security Systems,
which develops security
software for Internet companies.
"This is not a problem
that you can solve by throwing
money at it. It needs
technology."
Rouland added that so-called
intrusion software to
combat this problem just
became available in
November. The intrusion
software detects the problem,
allowing companies to race
to reconfigure a service
provider to circumvent the
problem. Existing software
can automatically reconfigure
servers, but few
companies actually use it,
Rouland said.
"Everybody is vulnerable,"
said Alan Alper, an analyst
at Gomez Advisors.
"People don't put procedures
in place to prevent it
because of the time and
the money it takes," Alper said.
"Solutions to the problem
are only reactive and there's
not much you can do to prevent
it."