Language Selection

English French German Italian Portuguese Spanish

ISPs join to 'fingerprint' Internet attacks

Filed under
Security
Web

Leading global telecommunications companies, Internet service providers and network operators will begin sharing information on Internet attacks as members of a new group called the Fingerprint Sharing Alliance, according to a published statement from the new group.

The companies, including EarthLink Inc., Asia Netcom, British Telecommunications PLC and MCI Inc., will share detailed profile information on attacks launched against their networks. Information to be shared will include the sources of attacks. The alliance will make it easier for service providers and network operators to crack down on global Internet attacks more quickly, according to Tom Schuster, president of Lexington, Mass.-based Arbor Networks Inc., which launched the new alliance.

The Fingerprint Sharing Alliance uses technology from Arbor called Peakflow to spot network attacks and automatically generate a profile, or "fingerprint," of the attack in a standard data file format called PCAP. That fingerprint information is passed along to other service providers closer to the source of the attack, which can then block the source of the traffic, Schuster said.

Arbor wrapped features that support the Fingerprint Sharing Alliance into the last release of Peakflow, which came out earlier this year. Alliance members have been using Peakflow to share attack fingerprints since then, Schuster said.

The alliance replaces an ad hoc system of e-mail messages and phone calls that operators of large networks have used to coordinate their response to attacks and threats, Arbor said. Because communication has been cumbersome, ISPs and network owners have had no incentive to share attack information.

The alliance will make it easier for them to cooperate and will lower the threshold that attacks must surpass to get the attention of ISPs. Even attacks on small ISP customers will prompt a response from large infrastructure providers. Peakflow also scrubs the data in fingerprints so alliance members can't use them to sniff sensitive information on competitors, according to Schuster.

"People are realizing that the world is a connected place. We have to empower service providers at the point of origin to have zero tolerance," he said.

Cracking down on those behind even small attacks may also improve the overall health of the Internet and quell raging problems such as "botnets" of zombie computers that are used in large-scale attacks, according to Schuster.

Membership in the alliance is not limited to Arbor customers or Peakflow users. Network owners that are not Arbor customers can generate their own fingerprints and accept PCAP-format fingerprints generated by Alliance members. However, Arbor's technology "speeds up the process considerably" by automatically creating and distributing the fingerprints.

All current members of the alliance are Peakflow customers, and the company's roster of global ISPs gives the program bite, Schuster said.

The alliance is a first step in addressing the problem of Internet attacks. Arbor hopes that the participation of leading service providers will compel competitors, as well as smaller network owners, to take part as well.

By Paul Roberts, IDG News Service.

More in Tux Machines

Opera Data Breach, Security of Personal Data

  • Opera User? Your Stored Passwords May Have Been Stolen
    Barely a week passes without another well-known web company suffering a data breach or hack of some kind. This week it is Opera’s turn. Opera Software, the company behind the web-browser and recently sold to a Chinese consortium for $600 million, reported a ‘server breach incident’ on its blog this weekend.
  • When it comes to protecting personal data, security gurus make their own rules
    Marcin Kleczynski, CEO of a company devoted to protecting people from hackers, has safeguarded his Twitter account with a 14-character password and by turning on two-factor authentication, an extra precaution in case that password is cracked. But Cooper Quintin, a security researcher and chief technologist at the Electronic Frontier Foundation, doesn’t bother running an anti-virus program on his computer. And Bruce Schneier? The prominent cryptography expert and chief technology officer of IBM-owned security company Resilient Systems, won’t even risk talking about what he does to secure his devices and data.

Android Leftovers

FOSS and Linux Events

  • On speaking at community conferences
    Many people reading this have already suffered me talking to them about Prometheus. In personal conversation, or in the talks I gave at DebConf15 in Heidelberg, the Debian SunCamp in Lloret de Mar, BRMlab in Prague, and even at a talk on a different topic at the RABS in Cluj-Napoca.
  • TPM Microconference Accepted into LPC 2016
    Although trusted platform modules (TPMs) have been the subject of some controversy over the years, it is quite likely that they have important roles to play in preventing firmware-based attacks, protecting user keys, and so on. However, some work is required to enable TPMs to successfully play these roles, including getting TPM support into bootloaders, securely distributing known-good hashes, and providing robust and repeatable handling of upgrades. In short, given the ever-more-hostile environments that our systems must operate in, it seems quite likely that much help will be needed, including from TPMs. For more details, see the TPM Microconference wiki page.
  • More translations added to the SFD countdown
    Software Freedom Day is celebrated all around the world and as usual our community helps us to provide marketing materials in their specific languages. While the wiki is rather simple to translate, the Countdown remains a bit more complicated and time consuming to localize. One needs to edit the SVG file and generate roughly a 100 pictures, then upload them to the wiki. Still this doesn’t scare the SFD teams around the world and we are happy to announce three more languages are ready to be used: French, Chinese and German!

Second FreeBSD 11.0 Release Candidate Restores Support for 'nat global' in IPFW

Glen Barber from the FreeBSD project announced the availability of the second RC (Release Candidate) development build of the upcoming FreeBSD 11.0 operating system. Read more