Internet companies report biggest-ever denial of service operation
[ad_1]
WASHINGTON : Internet companies Google, Amazon and Cloudflare say they have weathered the internet’s largest-known denial of service attack and are sounding the alarm over a new technique they warn could easily cause widespread disruption.
Alphabet Inc-owned Google said in a blog post published Tuesday that its cloud services had parried an avalanche of rogue traffic more than seven times the size of the previous record-breaking attack thwarted last year.
Internet protection company Cloudflare Inc said the attack was “three times larger than any previous attack we’ve observed.” Amazon.com Inc’s web services division also confirmed being targeted by “a new type of distributed denial of service (DDoS) event.”
Denial of service is among the web’s most basic form of attack and it works by simply overwhelming targeted servers with a firehose of bogus requests for data, making it impossible for legitimate web traffic to get through.
As the online world has developed, so too has the power of denial of service operations, some of which can generate millions of bogus requests per second. The recent attacks measured by Google, Cloudflare and Amazon – which began in late August and which the tech giants say are ongoing – were capable of generating hundreds of millions of request per second.
Google said in its blog post that only two minutes of one such attack “generated more requests than the total number of article views reported by Wikipedia during the entire month of September 2023.”
All three companies said the supersized attacks were enabled by a weakness in HTTP/2 – a newer version of the HTTP network protocol that underpins the World Wide Web – that makes servers particularly vulnerable to rogue requests.
The firms urged companies to update their web servers to ensure that they do not remain vulnerable.
None of the three companies said who was responsible for the denial of service attacks, which have historically been difficult to attribute.
[ad_2]
Source link