EFTA00817089
EFTA00817090 DataSet-9
EFTA00817092

EFTA00817090.pdf

DataSet-9 2 pages 588 words document
P17 V16 P19 D3
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (588 words)
From: Vincenzo Iozzo To: "jeffrey E." <[email protected]> Cc: Joi Ito , Danny Hillis MI Reid Hoffman Subject: Re: Date: Mon, 26 Sep 2016 11:55:45 +0000 Warning: this is likely going to be a long essay, but I think it gives some perspective on the topic. The short version is: I was talking to Joi about this the other day - I wouldn't pay too much attention to this, Schneier has a long tradition of dramatizing and misunderstanding things. That said, buying cloudflare (it's private) or akamai stock might be an idea because DDos attacks are not going away soon and as a trend they will likely increase. Longer version: So back to the Schneier, If you listen to the podcast he links (which you shouldn't cause it's a waste of time) he doesn't give any numbers. Also to provide some perspective, he links to this: https://www.verisign.com/assets/report-ddos-trends- Q22016.pdf If you look at the numbers on page 9 they are an order of magnitude smaller than the attack on a, rather unknown to the general public, cyber security journalist: https://krebsonsecurity.corn/2016/09/krebsonsecurity-hit-with- record-ddos/ And we are talking average not median.. CloudFlare was able to absorb most of the attack on Krebs' website and they probably brought the website down because he wouldn't be able to pay for the service at that rate anyway. So those numbers there are nowhere close to "probing" the limits as he suggests.. The more interesting aspect is that DDos attacks boil down to two strategies: I) "Amplication" attacks - which is a text book example of the tragedy of the commons 2) Force real traffic to happen. This often happens when you compromise a device (that's what a botnet does). In that sense IoT is particularly dangerous (1) Is a good argument for Danny's idea of building a backup Internet. The problem there is that a lot of protocols (DNS, NTP etc etc) have design flaws in that you can generate asymmetric amounts of traffic and force the traffic to go to some other destination. (eg: https://www.us-cert.govincas/alerts/TA13-088A) In a lot of cases people leave around the intemet vulnerable servers and those are used for these types of attacks (hence the tragedy of the common). (2) Is a much harder problem to solve and to a large extent it wouldn't go away even if we had a different intemet. EFTA00817090 And (2) is interesting because you don't necessarily need to compromise the target if you have control of the network infrastructure. For instance, China attacked GitHub by injecting JavaScript into people's navigation session (http://www.netresec.corrinpage=Blog&month=2015-03&post—China%27s-Man-on-the-Side-Attack-on- GitHub). The Javascript code would then reach out to GitHub and DDos the website. Computer Science problem aside, (2) is problematic because it leads people to think that things like this: hup://www.skatingonstilts.com/skating-on-stilts/spiking-the-great-cannon.html are a good idea.. These poor man's attempts at "sanctions" are not a solution, neither from a diplomatic/political POV nor from a technical one in my opinion. Sent from my Iphone On Sep 26, 2016, at 10:40, jeffrey E. leevacation®gmail.com> wrote: http://fortune.com/2016/09/25/intemet-infastructure-attacic/?xid=gn_editors icks&google_editors_picks=true please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation®gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00817091
ℹ️ Document Details
SHA-256
a18831dd35c42e8a6586d6f713de73bcf7069a5f5e4368e06e26eb719e3f7349
Bates Number
EFTA00817090
Dataset
DataSet-9
Document Type
document
Pages
2

Comments 0

Loading comments…
Link copied!