Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
Where's my gigabit Internet, anyway?
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested
Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab
10 Hot Hadoop Startups to Watch
/

Forum warns of hidden DDoS legal liability

Today's breaking news
Send to a friendFeedback


ATLANTA - Corporations and ISPs could be held liable for unwittingly allowing computers on their networks to become pawns, or "zombie" machines, in distributed denial-of-service attacks that harm customers or other companies.

That was one message last week from an industry consortium set up to fight the distributed denial-of-service threat. The consortium, dubbed the RFC 2267-plus Working Group, unveiled itself at NetWorld+ Interop 2000 (See story).

"It might not be enough to say they were not aware they could become a zombie," says Frank Huerta, CEO of Recourse Technologies, one consortium member. The group gets its name from RFC 2267, the Internet router filtering standard that could be used to help thwart distributed denial-of-service attempts.

If the group develops a body of accepted safe practices, corporate IS executives will have to comply or risk liability if their computers are commandeered to carry out distributed denial-of-service attacks, consortium members warn.

Risking liability

"Court cases will say, 'You had a reasonable expectation and maybe you should have been looking for it,'" Huerta says.

Consortium members say while the group is trying to enlist help from Internet equipment vendors, service providers and law enforcement departments, it also needs help from firms linked to the Internet.

Henry Teng, the moderator of RFC2267-plus and a KPMG consultant, says the group is promoting the sharing of information about distributed denial-of-service attacks to help companies develop better strategies to limit distributed denial-of-service impact and reduce the chance such attacks will be launched in the first place.

Representatives from Yahoo and eBay, two Web businesses hit earlier this year by one of the largest distributed denial-of-service attacks, say cooperation is essential, even if it means sharing information about networks with competitors.

"A collaborative approach will make for us, as users and companies, an Internet that is more reliable, faster and safer," says John Zent, manager of risk management for Yahoo.

"This is an industry problem," says Allen Yousefi, information security officer at eBay. "It's not just a problem for eBay or Yahoo or Amazon.com. We're big names, so we get the attention."

While the RFC2267-plus Working Group is pushing for cooperation, it has no unified set of answers to distributed denial-of-service attacks yet. However, Allen Wilson, who represented Internet Security Services at the group's launch, suggests some practical measures companies can take to avoid distributed denial-of-service attacks and being used as a launch pad for such attacks:

Establish a response team that maps out your reaction to attacks.

Audit security of machines in the demilitarized zone between your firewalls.

Mitigate risks by installing known security software patches and installing an intrusion-detection system.

Constantly review security; it's a process, not a one-time project.

ISPs are also worried about liability if their networks fail to detect distributed denial-of-service traffic and head off the flood before it levels its victim, says Tom Clare, a senior product manager for Check Point Software. That concern could lead to changes in service-level agreements ISPs are willing to back, he adds.

RELATED LINKS


NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.