San Francisco Chronicle

Why the Web went down: DNS and DDoS explained

- Wendy Lee is a San Francisco Chronicle staff writer. Daniel DeMay is a SeattlePI.com staff writer. Email: wlee@sfchronicl­e.com, daniel demay@seattlepi.com Twitter: @thewendyle­e, @Daniel_DeMay By Wendy Lee and Daniel DeMay

For hours Friday, users around the country had trouble accessing websites and apps like Twitter, Spotify and Reddit. The reason: an electronic attack on Dyn, a firm that hosts domain servers.

Domain Name System (DNS) servers are key to directing traffic on the Internet. The servers take in Web addresses typed by users, like www.twitter.com, translate them into numerical addresses computers understand, and route them to the sites they seek. When those servers get bogged down by attacks, they are unable to direct Internet traffic to the appropriat­e sites. Almost every online operation depends on DNS functionin­g correctly.

“They are kind of like the address book of the Web,” said Rob Enderle of advisory services firm Enderle Group. “DNS servers are critical. Without them, if they are knocked out and fail, you’re disconnect­ed.”

Enderle said there is not as much money to be made in attacking DNS servers as in other types of attacks, like ransomware. But one reason people target the servers is for the spectacle of causing major disruption. For example, if a country believes a hostile government is threatenin­g it with attack, the country could disrupt DNS servers, to show that the hostile government is vulnerable as well, Enderle said.

The specific attack used is known as a distribute­d denial of service, or DDoS, attack. A typical distribute­d denial of service attack aims to overwhelm websites with traffic. Usually, a specific website or company is targeted. The idea is that if enough traffic is sent to them, they will be inaccessib­le.

Hackers start by building networks of computers infected with malicious software — botnets, or networks of machines that have been “botted,” or taken over so they can be remotely controlled without their owners knowing. Increasing­ly, it’s not just computers and smartphone­s that are being used. Household devices, toys and other machines connected to the Internet are being taken over and used to send spurious traffic.

These botnets are bought and sold on the black market. Someone can buy a weeklong DDoS attack for as little as $150. DDoS attacks are more common than one might imagine. Digital Attack Map, a Googleback­ed site, reports that more than 2,000 DDoS attacks are observed every day. A third of all website downtime can be attributed to DDoS attacks.

Attacks are launched in several ways, but they fall into four categories: TCP connection attacks that attempt to use up all the available connection­s to a source; volumetric attacks, which aim to consume available bandwidth and thus cause enough congestion to slow or limit access to a site or sites; fragmentat­ion attacks, where the botnets send a flood of fragmented data that the target must try to reassemble, overwhelmi­ng its ability to do so; and applicatio­n attacks that try to overwhelm a specific part of an applicatio­n or service. Friday’s DNS attacks appear to be in that last category.

“They are kind of like the address book of the Web.” Rob Enderle of advisory services firm Enderle Group

Newspapers in English

Newspapers from United States