- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
Network World - NeuStar confirmed that some of its UltraDNS managed DNS service customers were knocked offline for several hours Tuesday morning by a distributed denial of service attack.
"Early this morning, our monitoring systems detected a significant denial of service attack, which affected a small subset of our customers, in some cases for as long as a few hours," the Reston, Va. company said in a statement. "While we continue to investigate the cause, the extent, and the duration of the attack, service was completely restored by 10 a.m. EST."
"We saw some funkiness starting over in Europe, and we were seeing that resolution for Amazon.com was failing," says Dynamic Network Services CEO Jeremy Hitchcock. "It looks like a pretty large outage that was affecting UltraDNS customers. It started this morning around 8 a.m, and for a two-hour period traffic was very significantly affected. Now it looks like things have settled down."
Hitchcock said his company’s Dynect Platform monitoring system saw heavy packet loss on UltraDNS name servers, with as much as 50% to 70% of responses being dropped.
"It’s a pretty significant event to have that kind of wide-scale disruption," Hitchcock added.
NeuStar is a leading provider of Internet infrastructure services. In addition to providing its UltraDNS suite of managed DNS services, NeuStar is the registry for the .biz and .us domains, and it provides telephone number look-up services for carriers in North America.
NeuStar has been a leader in the push to deploy security extensions to the DNS infrastructure through an emerging standard dubbed DNSSEC.
However, DNSSEC doesn’t address the problem of denial of service attacks. Instead, DNSSEC prevents hackers from hijacking Web traffic and redirecting it to bogus sites. Denial of service attacks, on the other hand, occur when a hacker disables a Web site by flooding it with bogus requests usually sent from a bot network.
Read more about security in Network World's Security section.