Home Business IT Security Cyberattack highlights need for vigilance says peak body

Cyberattack highlights need for vigilance says peak body Featured

The reported Distributed Denial of Service (DDoS) attack on internet spam-fighting group Spamhaus highlights the the fragility of the internet, according to Australia’s Internet Industry Association.

As we reported earlier today, a DDoS attack has slowed down the internet and threatened many of the core services that World Wide Web is built on, and Australia's peak internet group is callin for vigilance in protecting core server infrastructure from these types of attacks.

DDoS attacks are used to target certain Internet websites and servers with huge volumes of traffic, which can ultimately bring those servers and the internet traffic flowing through them to a grinding halt.

John Ellis, Enterprise Security Director for APJ, representing IIA Member, Akamai Technologies, said "The internet is an inter-network of separately managed networks, that are connected together through a series of hierarchal relationships between network provider."

"Those who attacked Spamhaus were smart in understanding these relationships and after initial efforts to disrupt the availability of the Spamhaus website failed, targeted the upstream network providers. These attacks were designed to 'suffocate' where many of the networks meet at what are known as Internet Exchanges (IXs).

"By targeting these internet exchanges, the Spamhaus attackers where able to create significant amount of congestion at key points of the Internet. This resulted in significant portions, and users of the internet experiencing performance issues.

"Whilst the Internet Exchanges were able to reroute around these congestion points, the attack further highlighted additional vulnerabilities in design and implementations of networks on the internet."

At this stage there have been no reports of this attack having a direct impact on Australian Internet user devices, however Patrick Gilmore of Akamai Technologies said the attack was so large that online bystanders had been hit as well.

Home users could experience slower internet or be subjected to unwanted emails.

"This not only highlights the need for service providers to be vigilant in relation to their core Internet server security but also the importance of initiatives such as the Internet Industry Association code, which provides a mechanism for ISPs to alert their customers should such attacks result in the dissemination of malicious software that may affect an end-user's device", said Chief Executive of the IIA Peter Lee.

WEBINAR 26/27th May

Thinking of deploying Business Intelligence (BI)? So are your competitors.

And the most important, fundamental, tool for delivering your BI information to your users? Dashboards.




VMware changed the rules about the server resources required to keep a database responding

It's now more difficult for DBAs to see interaction between the database and server resources

This whitepaper highlights the key differences between performance management between physical and virtual servers, and maps out the five most common trouble spots when moving production databases to VMware

1. Innacurate metrics
2. Dynamic resource allocation
3. No control over Host Resources
4. Limited DBA visibility
5. Mutual ignorance

Don't move your database to VMware before learning about these potential risks, download this FREE Whitepaper now!


David Swan

David Swan is a tech journalist from Melbourne and is iTWire's Associate Editor. Having started off as a games reviewer at the age of 14, he now has a degree in Journalism from RMIT (with Honours) and owns basically every gadget under the sun.






Join the iTWire Community and be part of the latest news, invites to exclusive events, whitepapers and educational materials and oppertunities.
Why do I want to receive this daily update?
  • The latest features from iTWire
  • Free whitepaper downloads
  • Industry opportunities