• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • About
  • Contact
  • Subscribe
  • Advertise
methodshop

methodshop

tech news, reviews & how to's

  • Top Stories
  • Latest
  • Fun
  • Life
  • Learn

Home : Security : Internet’s Behind-The-Scenes Protectors Foil Hacker Attack

Hacker Anonymous
Michael Treu

Internet’s Behind-The-Scenes Protectors Foil Hacker Attack

February 8, 2007 by jayfrankwilson
FacebookTweetPinLinkedIn

A hacker attack on the Internet failed this week — but experts warn there could be more to come.

Three of the 13 computers that help direct all Internet traffic were hit with a flood of data requests Tuesday. Although it’s not yet clear where the torrent came from, it was most likely designed to overwhelm the computers, says Peter Reiher, a professor at UCLA’s engineering school.

Hackers commonly use this approach, called a denial of service attack, to cause computers to slow down or crash.

If the attack had been successful, Internet traffic might have slowed to a crawl. But the technical groups that quietly run the Internet behind the scenes have built a system designed to reroute traffic during an attack. It appeared to have worked, since few users noticed any slowdown, says Edward Naughton, a Boston-based lawyer at Holland & Knight who specializes in Internet issues.

“It’s an indication that the system is well designed,” he says.

But that does not mean it is foolproof, says Avi Silberschatz, head of Yale’s computer science department. In a worst-case scenario, the attack may have been a small-scale assault designed to test the vulnerability of the system, he says. The unknown hackers “may be thinking about something big,” he says. On the other hand, “It may have just been kids,” he says.

Internet'S Behind-The-Scenes Protectors Foil Hacker Attack - Programmer Woman Glasses 1

Hackers launch denial of service attacks by taking over thousands of everyday PCs that don’t have adequate anti-virus and other protections installed. Then they redirect all that computing power toward the targeted computer. It’s not difficult for someone with midlevel computer knowledge to do, Reiher says. That’s one reason denial of service attacks are so dangerous.

No one organization is in charge of keeping the Internet safe and running smoothly.

A hodgepodge of technical groups runs the Net behind the scenes in partnership with governments and corporations. This arrangement is not without controversy. Several key governance groups, including the Marina del Rey, Calif.-based Internet Corp. for Assigned Names and Numbers, have ties to the U.S. government. The relationships are linked to the Internet’s roots as a Defense Department-funded university research project.

At a United Nations Internet conference in October, many other countries called for more worldwide involvement in Internet governance. So did Yoshio Utsumi, a U.N. telecommunications official.

But this week’s unsuccessful attack is an indication that the current administration is keeping the Internet working well, Naughton says. “We weren’t just lucky,” he says.

Related Posts:

  • Battlestar Galactica Podcast Takes Fans Behind The Scenes Of The Popular TV Show
    Battlestar Galactica Podcast Takes Fans Behind The Scenes Of…
  • The Dyn DDoS Attack and New Security Needs for The Internet-of-Things
    The Dyn DDoS Attack and New Security Needs for The…
  • Hacker Charged With Stealing Information From U.S. Army (2006)
    Hacker Charged With Stealing Information From U.S. Army…



FacebookTweetPinLinkedIn
Category: Security, Crime, News Tag: Hacks, Internet, internet
Previous Post: « Law & Order SVU Valentine’s Day Cards
Next Post: New York City Politician Carl Kruger Proposes An iPod Crosswalk Ban (2007) New York City iPod Crosswalk Ban »

Sidebar

Trending Now

  • 18 Weird Facts About Sea-Monkeys You Won't Believe Are True, Including Their Connection To The Ku Klux Klan18 Weird Facts About Sea-Monkeys You Won’t Believe Are True, Including Their…
  • 20 Famous People Who Are Members Of The Sleepless Elite20 Famous People Who Are Members Of The Sleepless Elite
  • The 30 Best Caddyshack Quotes That'll Make You LaughThe 30 Best Caddyshack Quotes That’ll Make You Laugh
  • 25 Reasons Why Action Park Was The World's Most Dangerous Amusement Park25 Reasons Why Action Park Was The World’s Most Dangerous Amusement Park
  • 7 Pictures Of Naked People Captured By Google's Cameras7 Pictures Of Naked People Captured By Google’s Cameras
  • Is Your Hatch Restore Already Registered? Here's How To Fix It And Unregister A Hatch Restore.Is Your Hatch Restore Already Registered? Here’s How To Fix It And…
  • A Few Good Men Quotes: The 12 Most Dramatic Quotes From The FilmA Few Good Men Quotes: The 12 Most Dramatic Quotes From The Film
  • 7 Reasons Why A Team America 2 Sequel Will Never Get Made7 Reasons Why A Team America 2 Sequel Will Never Get Made
  • 1 Night In Paris - An Honest Review Of The Paris Hilton Sex Tape1 Night In Paris – An Honest Review Of The Paris Hilton Sex Tape
  • Gosh! Here Are 10 Napoleon Dynamite Quotes That We Will Reference ForeverGosh! Here Are 10 Napoleon Dynamite Quotes That We Will Reference Forever

Categories

About

MethodShop’s mission is to entertain, inform, and sometimes gross you out. MethodShop has affiliate relationships, so we may get a small share of the revenue from your purchases. Items are sold by the retailer, not by us. All prices are subject to change.

Latest

Apple AirTag Helps Police Recover Stolen Political Yard Signs At Opponent's Fort Lauderdale Home

Apple AirTag Helps Police Recover Stolen Political Yard Signs From Opponent’s Fort Lauderdale Home

Vintage Sexist Ads

The 28 Most Sexist Ads From The Mad Men Era Of Advertising

Follow

  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Pinterest
MethodShop Animated Zoom Icon
  • About
  • Submit
  • Disclaimer
  • Privacy Policy
  • Contact
  • Subscribe
  • Store

Copyright © 2022 MethodShop · All Rights Reserved · Powered by BizBudding Inc.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT