SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
Volume 1, Number 4




4th Quarter, 2008


The State of
the Internet
                        RT
                      PO
                    RE
Executive Summary

                                                                                                                                     Each quarter, Akamai will be publishing a quarterly “State of the Internet” report. This report
                                                                                                                                     will include data gathered from across Akamai’s global server network about attack traffic
                                                                                                                                     and broadband adoption, as well as trends seen in this data over time. It will also aggregate
                                                                                                                                     publicly available news and information about notable events seen throughout the quarter,
                                                                                                                                     including Denial of Service attacks, Web site hacks, and network events, including outages
                                                                                                                                     and new connections.


                                                                                                                                     During the fourth quarter of 2008, Akamai observed attack traffic originating from 193
                                                                                                                                     unique countries around the world. The United States and China were the two largest attack
                                                                                                                                     traffic sources, accounting for over 42% of observed traffic in total. Akamai observed attack
                                                                                                                                     traffic targeted at more than 20,000 unique ports, with the top 10 ports seeing over 77% of
                                                                                                                                     the observed attack traffic. Web site hacks and Web-based exploits were regularly in the news
                                                                                                                                     during the quarter, as was a proof-of-concept exploit for a vulnerability in SSL, the underlying
                                                                                                                                     mechanism that secures financial and retail transactions, among others, across the Web.


                                                                                                                                     Notable network outages in the fourth quarter were due to submarine cables in the
                                                                                                                                     Mediterranean being severed, as well as two major Internet backbone providers de-peering
                                                                                                                                     their networks from one another. Notable Web site outages in the fourth quarter were
                                                                                                                                     attributed to increased traffic, hardware failure, and power outages.


                                                                                                                                     Global connectivity advanced in the fourth quarter, with the commercial launch or
                                                                                                                                     announcement of WiMAX and 3G broadband services in a number of countries, the launch
                                                                                                                                     of higher speed cable broadband services based on DOCSIS 3.0, and additional fiber-to-the-
                                                                                                                                     home services that will bring extremely high-speed connections to subscribers in Switzerland,
                                                                                                                                     Brazil, India, Spain, Italy, and Russia.


                                                                                                                                     Akamai observed a nearly six percent increase (from the third quarter 2008) globally in the
                                                                                                                                     number of unique IP addresses connecting to Akamai’s network, and a 28% increase from
                                                                                                                                     the end of 2007. From a global connection speed perspective, South Korea had the highest
                                                                                                                                     levels of “high broadband” (>5 Mbps) connectivity for the fourth consecutive quarter, and
                                                                                                                                     the highest average connection speed, at 15 Mbps. In the United States, Delaware also
                                                                                                                                     maintained its top position, with 62% of connections to Akamai occurring at 5 Mbps or
                                                                                                                                     greater, and the highest average connection speed in the United States, at 7.3 Mbps. Looking
                                                                                                                                     at observed “narrowband” (<256 Kbps) connections, Mayotte and Equatorial Guinea were
                                                                                                                                     the “slowest” countries, with 98% and 96% of connections to Akamai, respectively, occurring
                                                                                                                                     at speeds below 256 Kbps. In the United States, the District of Columbia continued to have
                                                                                                                                     the highest percentage of observed connections below 256 Kbps. However, this was down
                                                                                                                                     nearly seven percent from the prior quarter, and over 42% from the end of 2007.


The “spinning globe” featured in the Akamai NOCC represents where Akamai servers are located and how much traffic they are seeing.
Table of Contents                                                          Introduction
    1: IntroductIon                                                       3
    2: SecurIty                                                            4   Akamai’s globally distributed network of servers allows us to gather massive
    2.1 Attack Traffic, Top Originating Countries                          4   amounts of information on many metrics, including connection speeds, attack
    2.2 Attack Traffic, Top Target Ports                                   5   traffic, and network connectivity/availability/latency problems, as well as user
    2.3 Attack Traffic, By Day                                             6   behavior and traffic patterns on leading Web sites.
    2.4 Distributed Denial of Services (DDoS) Attacks                      8
    2.5 Web Site Hacks & Web-Based Exploits                                8
                                                                               In the fourth quarter of 2008, observed distributed denial of service (DDoS)
    2.6 TCP-Based Attacks                                                  9
                                                                               attack traffic continued to target a consistent set of ports, though it appears
    2.7 McColo Shutdown                                                    9
                                                                               that some are now being targeted by a new set of network worms. In addition,
    2.8 SSL Vulnerability                                                 10
                                                                               it appears that spikes in attack traffic may be correlated with patch releases or
    2.9 DNSSEC                                                            10
                                                                               security advisories issued by Microsoft, as hackers rush to exploit vulnerabilities
    3: networkS and web SIteS: ISSueS & ImprovementS                      11
                                                                               before system administrators can apply software patches.
    3.1 Network Outages                                                   11
    3.2 Routing Issues                                                    12
                                                                               Two large-scale network outages occurred during the quarter, as undersea
    3.3 Peering Issues                                                    13
                                                                               cables were once again severed in the Mediterranean, and as Sprint-Nextel
    3.4 Web Site Outages                                                  13
                                                                               de-peered their network from Cogent Communications. However, global
    3.5 Significant New Connectivity — Undersea Cables                    15
    3.6 Significant New Connectivity — Wireless                           15   connectivity continued to become more robust, with new WiMAX and 3G
    3.7 Significant New Connectivity — Fixed Broadband                    16   mobile broadband services being announced or launching in a number of
    3.8 DNS Expansion                                                     17   countries, and the introduction of DOCSIS 3.0 services and additional fiber-
    3.9 IPv6                                                              17   to-the-home initiatives, which are bringing higher speed connectivity to
    4: Internet penetratIon                                               18   subscribers in multiple countries.
    4.1 Unique IP Addresses Seen By Akamai                                18
    4.2 Internet Penetration, Global                                      19   In the fourth quarter, six countries connected to Akamai’s network at average
    4.3 Internet Penetration, United States                               20
                                                                               speeds in excess of 5 Mbps, and for the year, many countries showed
    5: GeoGraphy                                                          21   significant increases in their levels of high broadband (>5 Mbps) adoption.
    5.1 Average Connection Speeds, Global                                 21
                                                                               Decreases in the percentage of narrowband (<256 Kbps) connections to
    5.2 Average Connection Speeds, United States                          21
                                                                               Akamai were also seen both internationally and in the United States, likely due,
    5.3 High Broadband Connectivity: Fastest International Countries      24
                                                                               in part, to the growth in availability of, and options for, broadband connectivity.
    5.4 High Broadband Connectivity: Fastest U.S. States                  25
    5.5 Broadband Connectivity: Fast International Countries              26
    5.6 Broadband Connectivity: Fast U.S. States                          27
    5.7 Narrowband Connectivity: Slowest International Countries          28
    5.8 Narrowband Connectivity: Slowest U.S. States                      29
    6: appendIX: Selected InternatIonal data                              30
    7: endnoteS                                                           31




2                                                                                                                                                                    3
                   © 2009 Akamai Technologies, Inc. All Rights Reserved                            © 2009 Akamai Technologies, Inc. All Rights Reserved
Section 2: Security

                                                                          2.1 Attack Traffic, Top Originating Countries
Akamai maintains a distributed set of agents deployed                                                                                       In December, IT security firm Sophos published1 its                   destined for over 20,200 unique ports. Obviously, there is
                                                                                                                                            Security Threat Report 2009, which examined the security
across the Internet that serve to monitor attack traffic.                                                                                                                                                         a significant “long tail” that occurs – the top 200 target
                                                                          During the fourth quarter of 2008, Akamai observed
Based on the data collected by these agents, Akamai                                                                                         threat landscape over the course of 2008. The report                  ports only account for 73% of the observed attack traffic
                                                                          attack traffic originating from 193 unique countries
is able to identify the top countries from which attack                                                                                     noted that the top 5 malware-hosting countries in 2008                from the United States.
                                                                          around the world, up nearly 8% from the third quarter
traffic originates, as well as the top ports targeted                                                                                       consisted of the United States, China (including Hong
                                                                          count of 179 countries. This quarter, the United States
by these attacks. (Ports are network layer protocol                                                                                         Kong), Russia, Germany, and South Korea. It is interest-              For the third consecutive quarter, Port 445 (Microsoft-
                                                                          moved into the first place slot for the first time in 2008,
identifiers.) This section, in part, provides insight into                                                                                  ing to note that these countries have also all consistently           DS) held the first place spot, with a slightly higher
                                                                          after placing second to China or Japan throughout
Internet attack traffic, as observed and measured by                                                                                        been among the top 10 countries from which Akamai                     percentage of the overall observed traffic than in the
                                                                          the year. Argentina returned to the top 10 again in the
Akamai, during the fourth quarter of 2008. While                                                                                            has observed attack traffic originating in during 2008.               third quarter, and still below second quarter levels. This
                                                                          fourth quarter — it was ranked fifth for first quarter
some quarter-over-quarter trending may be discussed,                                                                                                                                                              port represented over half of the attack traffic observed
                                                                          attack traffic. Throughout 2008, the United States,
                                                                                                                                            2.2 Attack Traffic, Top Target Ports
it is expected that both the top countries and top                                                                                                                                                                from Argentina in the fourth quarter, approximately a
                                                                          China, Taiwan, South Korea, and Japan were consistently
ports will change on a quarterly basis.                                                                                                     During the fourth quarter of 2008, Akamai observed                    quarter of the attack traffic from the United States and
                                                                          among the top 10 countries that generated the highest
                                                                                                                                            attack traffic targeted at just over 20,800 unique                    Russia, and around a third of observed attack traffic
                                                                          percentages of attack traffic.
This section also includes information on selected DDoS                                                                                     ports, over eight times more than in the third quarter.               coming from Taiwan, Japan, Brazil, and Germany. While
attacks, Web site hacking attempts, Web-based exploits,                                                                                     Consistent with prior quarters, some of the attack traffic            this port was previously associated with the Sasser
                                                                          The trend in attack traffic distribution continues to be
and other attacks and events as published in the media                                                                                      targeted services on well-known ports. Due to the                     worm, it appears that it is also2 associated with the
                                                                          relatively consistent with the prior quarters, with the
during the fourth quarter of 2008. Note that Akamai                                                                                         significant growth in port count, the attack traffic was              Gimmiv.A worm, which exploited a vulnerability3 that
                                                                          top 10 countries as the source for just under 72% of
does not release information on attacks on specific                                                                                         slightly less concentrated than in prior quarters, with the           was considered to be significant enough to ultimately be
                                                                          observed attack traffic. (This is down slightly from prior
customer sites and that selected published reports are                                                                                      top 10 ports responsible for only 77% of the observed                 addressed by Microsoft in a patch4 released outside of
                                                                          quarters, where the top 10 countries accounted for
simply compiled here.                                                                                                                       attack traffic. (This is down from an 85% or greater                  their normal “Patch Tuesday” cycle. The Conficker worm
                                                                          74-78% of observed attack traffic.) The list of countries
                                                                                                                                            concentration during prior quarters of 2008.) While it                is reported to also be using Port 445 and exploiting
                                                                          within the top 10 appears to be getting more consistent,
                                                                                                                                            is unclear exactly what is accounting for the growth in               this same vulnerability to spread across the Internet.
                                                                          as observed across 2008 — the five countries listed above
                                                                                                                                            targeted port count, data from fourth quarter monitoring              The Conficker worm will be covered in more detail in
                                                                          appeared in the list during all four quarters, while Russia,
                                                                                                                                                                                                                  Akamai’s 1st Quarter, 2009 State of the Internet report.
                                                                                                                                            shows that the United States is clearly responsible for this
                                                                          Germany, and Brazil each held spots in the top 10 during
                                                                                                                                            growth during the quarter, with originating attack traffic
                                                                          three of the four quarters in 2008.


                                                                                                                                                                                                                    Destination       Port Use               % Traffic   Q3 08 %
          Country              % Traffic           Q3 08 %                                                                     7                                                              Microsoft-DS
                                                                                                                                                         OTHER
                                                                                                        3                                                                                                           Port
      1   united States          22.85              19.68
                                                                                                                                                                                                                    445               microsoft-dS             22.96     21.12
      2   china                  19.30              26.85
                                                                                                                                       9                                                                            80                www                      14.51      9.18
                                                                                                  8
      3   Sweden                 10.67               3.86
                                                                                                                                                 SMTP
                                                                                                                                                                                                                    139               netbIoS                  11.56     21.09
      4   taiwan                  5.61               2.54
                                                                                                                                                                                                                    22                SSh                      10.78      9.73
      5   South korea             2.52               9.37                                                                                   GhostSurf
                                                                                                                                                                                                                    135               microsoft-rpc             7.15     10.68
      6   argentina               2.51               0.39
                                                                             1                                                             VNC Server                                                               1433              microsoft SQl Server      2.46      3.20
      7   russia                  2.33               1.94
                                                                                                                                       5
                                                                                                                                                                                                                    8000              (multiple)                2.14      0.87
      8   Germany                 2.15               2.20                                                                                                                                            WWW
                                                                                                                                            (multiple)
                                                                                                                  2
                                                                                                  10                                                                                                                5900              vnc Server                2.07      1.93
      9   Japan                   2.00               3.13
                                                                                                                                              Microsoft
                                                                                                                                                                                                                    7212              GhostSurf                 1.93      0.74
                                                                                    6
     10   brazil                  1.68               2.64                                                                                     SQL Server
                                                                                                                                   4
                                                                                                                                                                                                                    25                Smtp                      1.89      2.28
      –   other                  28.38                 –
                                                                                                                                             Microsoft-RPC                                                          various           other                    22.56         –
                                                                                                                                                                                         NetBIOS
Figure 1: Attack Traffic, Top Originating Countries                                                                                                                 SSH

                                                                                                                                            Figure 2: Attack Traffic, Top Target Ports




4                                                                                                                                                                                                                                                                                  5
                                           © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                          © 2009 Akamai Technologies, Inc. All Rights Reserved
Section 2: Security (continued)

                                                                     After previous issues of Akamai’s State of the Internet
For the first time in 2008, Port 80 (WWW) moved into
second place in the top 10. SQL injection attacks cont-              report were published, it was suggested that attack traffic
inued to be a popular attack vector in the fourth quarter,           patterns may have a correlation with Microsoft’s “Patch
as noted in Section 2.5. The significant growth in obser-            Tuesday” updates — a so-called “Attack Wednesday”
ved attack traffic to this port may be due to scans looking          following the Tuesday release of patches by Microsoft, as
for Web servers that are vulnerable to such attacks.                 attackers looked for unpatched systems in order to exploit
Interestingly, Port 80 was responsible for over 93% of the           those specific vulnerabilities. However, looking at obser-
attacks that were observed to be originating in Sweden.              ved attack traffic from the fourth quarter, aggregated
                                                                     by day of week, it does not appear that this suggested
Attacks targeted at Port 8000 also grew significantly in             correlation necessarily holds, as is shown in Figure 3.
the fourth quarter, enough to push it into the top 10
list. Officially,5 Port 8000 is used for the “iRDMI” service,        In fact, it appears that Wednesdays accounted for the
                                                                                                                                   Figure 4: Attack Traffic, by Day of Quarter
though it is unclear what this service is, or what it is             lowest percentage of weekday traffic during the fourth
used for. However, the port is also6 reportedly used by              quarter, though still ahead of the percentage of attacks
a number of other software packages, and is also often               that was observed on Saturdays and Sundays.                   update9 issued by Microsoft that addressed a critical                   day11 by Microsoft, warning that systems running various
used as an alternative default port for HTTP traffic. It is                                                                        vulnerability in some versions of their Internet Explorer               older versions of SQL Server were vulnerable to attack,
not known which piece of software that binds to Port                 However, looking at attack traffic by day across the          Web browser, and the near-doubling of attack traffic                    and the traffic seen that day has a high likelihood of
8000 was targeted by these attacks.                                  quarter, a significant increase occurred on November 19,      seen on that day may be related to that vulnerability. In               being attempted SQL injection attacks.
                                                                     and attack traffic remained elevated throughout the rest      addition, the massive spike that was seen on December
Port 7212 also made its first appearance in the top 10               of the quarter, as shown in Figure 4.                         5 followed the posting of an “Advanced Notification”10                  Comparing the levels of attack traffic targeted at the
during the fourth quarter. During the third quarter, this                                                                          by Microsoft of the security bulletins that were going to               top three Microsoft-related ports (445, 139, and 135)
port was the top target port for attacks seen from China             It is interesting to note that November 19 is, in fact, a     be released the following Tuesday. Again, this increase in              aggregated across the fourth quarter, and charting the
— in the fourth quarter, it was the third most targeted              Wednesday, but did not follow a “Patch Tuesday”               attack traffic may have been related to attackers rushing               levels by day of week, they all appear to follow a similar
port for China-sourced attacks. Please refer to Akamai’s             release — Microsoft Security Bulletins MS08-0687 and          to exploit the related vulnerabilities ahead of patches                 pattern. The number of attacks reaches the highest levels
3rd Quarter, 2008 State of the Internet report for                   MS08-0698 were released a week prior. However, the            being issued. Finally, the spike seen on December 22 can                early in the week, bottoming out on Thursday, and then
additional details on Port 7212 vulnerabilities.                     peak seen on December 18 did follow an out-of-band            likely be correlated with a security advisory issued that               increasing again into the weekend, as shown in Figure 5.

2.3 Attack Traffic, By Day
                                                                                                                                                                                                                                                                135
                                                                                                                                                                                                                                                                139
                                                                                                                                                                                                                                                                445




                                                                                                                                           Sunday          Monday            Tuesday          Wednesday           Thursday              Friday   Saturday




Figure 3: Attack Traffic, Aggregated by Day of Week                                                                                Figure 5: Attack Traffic Targeting Ports 445, 139, and 135 by Day of the Week



6                                                                                                                                                                                                                                                                     7
                                      © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                       © 2009 Akamai Technologies, Inc. All Rights Reserved
Section 2: Security (continued)

                                                                                                                                                                                                  2.6 TCP-Based Attacks
This traffic pattern may also be influenced by Microsoft’s         Georgia.14 The Wordpress.com blog platform (hosting           SQL injection once again continued to be a popular
practice of releasing major patches on Tuesday —                   more than 4.5 million blogs) was subjected to a DDoS          vector for Web-based attacks during the fourth quarter.          As noted above in Section 2.2, the Conficker worm
vulnerabilities are exploited ahead of the patch releases,         attack on October 27 that caused some of its blogs to         Two Adobe Web sites, Vlog It and Serious Magic, were             exploits services running on TCP port 445, and was iden-
and then as compromised systems are patched, attack                become unavailable for a period of time. Wordpress.com        compromised through SQL injection in October, accord-            tified as a key component in a botnet that was estimated
volume decreases.                                                  has three origin data centers and was able to reroute         ing to Internet security firm Sophos.20 In November,             to include approximately half a million compromised
                                                                   the relevant traffic to unaffected servers once the DDoS      security firm Kaspersky Lab discovered 1,200 Web sites           systems by early December.30 The Conficker worm will
2.4 Distributed Denial of Service                                  attack had been identified and isolated.15                    around the world that had been compromised by an SQL             be covered in more detail in Akamai’s 1st Quarter, 2009
    (DDoS) Attacks                                                                                                               injection attack that appeared to originate from China.21        State of the Internet report.
The Internet celebrated an auspicious occasion on                                                                                In late December, Microsoft issued a warning22 about a
                                                                   2.5 Web Site Hacks & Web-Based Exploits
                                                                                                                                                                                                  2.7 McColo Shutdown
November 2, 2008, the 20th anniversary of the “Morris                                                                            critical bug in its SQL server software that could be
                                                                   In December, the Koobface virus resurfaced on Facebook.
Worm”, arguably the first major denial of service attack                                                                         exploited by attackers.                                          In mid-November, hosting provider McColo Corp. was
                                                                   The virus leverages malware unknowingly downloaded by
on the Internet. According to a published report,12 the                                                                                                                                           disconnected from the Internet. Identified as a major host
                                                                   users, which sends out messages to their Facebook friends,
                                                                                                                                 As initially described in the 3rd Quarter, 2008 State of
worm was written by then Cornell University student                                                                                                                                               of organizations engaged in sending unsolicited e-mail
                                                                   urging them to click on a link that takes them to an infec-
                                                                                                                                 the Internet report, the Web-based attack vector known
Robert Tappan Morris, who was later convicted of com-                                                                                                                                             (“spamming”), it was reported that McColo had been
                                                                   ted Web site,16 as well as hijacking search requests made
puter fraud for the incident. Morris is now an associate                                                                         as “clickjacking” gained additional exposure during the          responsible for up to 75% of all spam sent each day.31
                                                                   to popular search sites such as Google, Yahoo, and MSN.
professor of computer science at MIT. Launched on                                                                                fourth quarter. In early October, an Israeli research
November 2, 1988, the Morris worm disabled approxi-                                                                              released a proof-of-concept demo that highlighted the            In addition to reducing spam volumes across the Internet,
                                                                   As discussed in the previous two issues of the State of the
mately 10% of all Internet-connected systems. The worm                                                                           threat posed the clickjacking flaw.23 Days later, Adobe          the disconnection of McColo also served to disrupt the
                                                                   Internet report, cross-site scripting (XSS) continues to be
was a self-replicating program that exploited known                                                                              posted24 a workaround procedure to help mitigate                 “Rustock” and “Srizbi” botnets, crippling an estimated
                                                                   a problem. In October, Yahoo fixed an XSS error in the
weaknesses in common utilities including e-mail software                                                                         exposure, and subsequently released a Flash Player               500,000 compromised systems (“bots”).32 Although
                                                                   hotjobs.yahoo.com domain that allowed attackers to in-
sendmail, as well as Finger, a tool that showed which                                                                            update25 that addressed the security vulnerabilities.            the Srizbi botnet control servers resurfaced at an ISP in
                                                                   ject JavaScript code into the page that silently copied the
users were logged on to a given computer.                                                                                                                                                         Estonia, that ISP quickly cut off connectivity to those
                                                                   cookies used to authenticate Yahoo users when they log
                                                                                                                                 In October, a researcher at Aladdin Knowledge Systems            servers.33 Unfortunately, the Srizbi bots gradually
                                                                   in to sections of the site that require a password. Attack-
Several high-profile Web sites suffered DDoS attacks                                                                             announced that that he had discovered a cache of user-           became active again through updates to their code, and
                                                                   ers, using these cookies, then had broad control over the
during the fourth quarter. The BBC Web site was subjec-                                                                          names and passwords for over 200,000 Web sites,                  it appeared that several weeks after the McColo shut-
                                                                   victim’s Yahoo account, including Yahoo e-mail and any
ted to a DDoS attack on November 6 that crippled the                                                                             including 80,000 that had been modified with malicious           down that spam volumes were once again on the rise.34
                                                                   other service that uses authentication cookies belonging
Web site’s performance significantly. During the attack,                                                                         content.26 According to the researcher, the 200,000
                                                                   to the yahoo.com domain.17 In December, it was discovered
the BBC Web site responded very slowly, and measure-                                                                             compromised sites included those belonging to govern-
                                                                   that an XSS error on americanexpress.com allowed attack-
ments made by monitoring service Pingdom showed that                                                                             ments, Fortune 500 companies, universities and other
                                                                   ers to steal users’ authentication cookies, which are used
for a total of 1 hour and 15 minutes it did not respond                                                                          businesses; more than half of the affected sites belonged
                                                                   to validate American Express customers after they enter
at all.13 The Web site for “NO on Prop 8” (opposing                                                                              to European companies and organizations. Other Web
                                                                   their login credentials.18 However, the security hole was
Proposition 8, which would eliminate same-sex couples’                                                                           sites hacked in the fourth quarter included those belong-
                                                                   closed within an hour after an article about it was posted
right to marry in California) was hit by a DDoS attack                                                                           ing to online bill payment company CheckFree,27 the
                                                                   on IT news Web site The Register. Four XSS bugs on the
that took the site down for several hours on October 29,                                                                         Ohio Secretary of State,28 and the World Bank.29
                                                                   Facebook Web site were also publicized and quickly
with attack traffic originating from computers not just            addressed in December.19
within California, but also from Texas, New Jersey and




8                                                                                                                                                                                                                                                         9
                                    © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                 © 2009 Akamai Technologies, Inc. All Rights Reserved
Section 3: Networks and Web Sites:
Section 2: Security (continued)                                                                                                                 Issues & Improvements

2.8 SSL Vulnerability                                               2.9 DNSSEC                                                                                                                          an alternate submarine cable through Puerto Rico.43
                                                                                                                                     The fourth quarter of 2008 saw another significant
                                                                                                                                                                                                        On December 8, over a million subscribers of Time
                                                                                                                                     network outage in the Mediterranean, as a result of three
On December 30, it was announced at the 25th Chaos                  Following the DNS exploit described by Dan Kaminsky
                                                                                                                                                                                                        Warner Cable saw their Internet connectivity impaired
                                                                                                                                     undersea cables being severed. A peering dispute between
Communication Congress that researchers had found a                 in the third quarter, and the subsequent push for the
                                                                                                                                                                                                        for approximately two-and-a-half hours due to the
                                                                                                                                     Sprint-Nextel and Cogent Communications effectively
way to target a known weakness in the MD5 algorithm                 implementation of DNSSEC, the Internet Corporation for
                                                                                                                                                                                                        failure of Time Warner’s DNS servers.44
                                                                                                                                     partitioned the Internet, preventing single-homed custo-
to create a rogue Certification Authority (CA) that would           Assigned Names and Numbers (ICANN),38 VeriSign,39 and
                                                                                                                                     mers of both providers from reaching one another. In
allow them to create “fake” SSL certificates that would             the United States Department of Commerce National
                                                                                                                                                                                                        Eerily echoing events of January 2008, on the morning
                                                                                                                                     addition, a number of high profile Web sites experienced
still be fully trusted by all modern Web browsers.35 As of          Telecommunications and Information Administration
                                                                                                                                                                                                        of December 19, three key underwater cables in the
                                                                                                                                     availability problems throughout the quarter due to a
the time of the announcement, at least six CAs were                 (NTIA)40 all issued proposals regarding the cryptographic
                                                                                                                                                                                                        Mediterranean (SeaMeWe-3, SeaMeWe-4 and FLAG)
                                                                                                                                     variety of reasons, including power outages and flash
using the MD5 algorithm to sign SSL certificates, and the           signature of the DNS root zone. NTIA invited interested
                                                                                                                                                                                                        were severed, which impacted Internet traffic in the
                                                                                                                                     crowds. Many new WiMAX initiatives were announced,
researchers estimated that 30-35% of all SSL certificates           stakeholders to file comments on the proposals, and
                                                                                                                                                                                                        Middle East and the Indian subcontinent.45 According
                                                                                                                                     which are likely to bring wireless broadband connectivity
currently in use had an MD5 signature somewhere in                  received more than 30 comments in favor of securing the
                                                                                                                                                                                                        to measurements from Renesys, more than 1,400 of
                                                                                                                                     to users in countries around the world, and new fiber-to-
their authentication chain.36                                       root zone. Commenters included representatives of the
                                                                                                                                                                                                        Egypt’s and more than 450 of India’s globally routed
                                                                                                                                     the-home initiatives and DOCSIS 3.0 rollouts brought
                                                                    Internet Architecture Board, the Internet Society, Akamai
                                                                                                                                                                                                        prefixes (networks) suffered outages, as shown in Figure
                                                                                                                                     extremely high-speed wired broadband connectivity to
Because the digital signature on the fake certificate               Technologies, NeuStar, Afilias, and Comcast.41
                                                                                                                                                                                                        6. Repairs to the SeaMeWe-3 and SeaMeWe-4 cables
                                                                                                                                     users in North and South America, Asia, and Europe.
appears to come from a reputable and presumably trust-
                                                                                                                                                                                                        began two days later, as the repair ship “Raymond
worthy CA, a user’s browser will accept it and indicate to          In the meantime, seven leading domain name vendors,
                                                                                                                                     3.1 Network Outages                                                Croze” was dispatched by France Telecom.46 Unfortu-
the user that the connection is secure. Coupled with the            representing more than 112 million domain names
                                                                                                                                                                                                        nately, as France Telecom finished repairing the
                                                                                                                                     On December 4, equipment failure caused a complete
DNS attack described by Dan Kaminsky, users could be                (65% of all registered domain names) formed the
                                                                                                                                                                                                        SeaMeWe-4 cable on December 25, the cable broke
                                                                                                                                     loss of Internet connectivity for two of the three ISPs in
redirected to malicious sites without being aware of it.            DNSSEC Industry Coalition to work together to drive the
                                                                                                                                                                                                        again in a different place, which pushed out repairs until
                                                                                                                                     Haiti that connect to the Internet through the ARCOS
These rogue e-commerce or banking sites, for example,               adoption of DNSSEC across all domain name registries
                                                                                                                                                                                                        approximately 10 days later than originally expected.47
                                                                                                                                     submarine cable. The outage lasted for approximately
would appear trusted, and could make the collection of              and registrars around the world.42 Participants in the
                                                                                                                                     three-and-a-half hours until traffic was re-routed through
login or other personal data fairly simple for an attacker          coalition include VeriSign (.com, .net), The Public Interest
without raising a user’s suspicion.                                 Registry (.org), Nominet UK (.uk), Afilias (.info), NeuStar
                                                                    (.biz, .us), the Foundation for Internet Infrastructure (.se),
Two days after the announcement, VeriSign announced                 and Educause (.edu). While the primary goal of the
that they would be transitioning from the MD5 algorithm             coalition is to accelerate the deployment of DNSSEC,
to the SHA-1 algorithm for digital certificates they issued,        the participants noted that it would be “unrealistic” to
and security researchers encouraged other CAs to do                 set forth a timetable for deployment until the issues
the same.37                                                         surrounding signature of the DNS root zone are resolved.




                                                                                                                                     Figure 6: Network Outages by Country (Data courtesy of Renesys)




10                                                                                                                                                                                                                                                              11
                                     © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                      © 2009 Akamai Technologies, Inc. All Rights Reserved
Section 3: Networks and Web Sites:
           Issues & Improvements (cont’d)

                                                                   3.2 Routing Issues                                               3.3 Peering Issues                                                3.4 Web Site Outages
A Reuters article48 noted that the three severed cables
were the most direct route for moving traffic between              On November 10, Companhia de Telecomunicacoes do                 On October 30, the network link between Cogent and                The Web site of file sharing service Yousendit was
Western Europe and the Middle East, and that Verizon               Brasil Central (CTBC) inadvertently leaked a nearly-full         Sprint-Nextel disappeared; from a routing perspective —           unavailable for over 5 hours in total, due to four separate
had rerouted some of its traffic by sending it across              set of routing information to two of its upstream network        Sprint de-peered Cogent. As a result, customers of                outages that occurred on November 17. The shortest
the Atlantic, then the United States, across the Pacific,          providers, in essence hijacking most of the Internet’s           Cogent lost access to networks connected to Sprint, and           outage lasted 30 minutes and the longest lasted 2 hours
and on to the Middle East. It is important to note that            address space. The data was not generally propagated             vice-versa.50 Cogent is no stranger to peering disputes,          and 25 minutes.56 XCalibre Communications’ FlexiScale
Akamai’s services can help customers maintain consistent           to the Internet at large, though, preventing another             and had been involved in at least four prior incidents over       on-demand utility computing platform experienced
site and application performance and availability when             YouTube-like issue that occurred earlier in the year. (See       the last six years — AOL in 2003, France Telecom in               another big outage in late October. The outage lasted
such cable cuts occur, and when alternate routes force             Section 3.3 of Akamai’s 1st Quarter, 2008 State of the           2006, Level 3 in 2005 and TeliaSonera in March 2008.51            approximately 18 hours and was reportedly due to near-
traffic across continents and oceans. Figure 7 illustrates         Internet report for additional details on the YouTube            A related post52 on the Renesys blog noted that 289               simultaneous failures in the switches that connect the
the results of a performance test for a customer portal            issue.) Ultimately, the leak had no significant global impact.   autonomous systems (networks) are completely single-              storage to the processing nodes.57 Google’s Gmail service
hosted in Europe, as seen by Akamai’s AsiaPac measure-             However, it did make its way to RIPE’s route collector in        homed (have no connectivity to the Internet through               continued to have problems in the fourth quarter,
ment agents. As shown, the measurement agents saw a                Sao Paolo, Brazil, where a volunteer-based route monitor-        anyone else) behind Cogent, and that 214 are completely           experiencing an outage starting on October 15 that
significant degradation in performance when trying to              ing project noticed the leaked announcement and                  single-homed behind Sprint. In addition, Renesys noted,           lasted approximately 30 hours.58 Some additional avail-
retrieve content from the origin during the two days               notified subscribers via e-mail of the hijacking.49 While        due to Cogent’s aggressive pricing, there are a large             ability issues impacting Gmail reportedly also occurred
before repairs began. However, portal performance as               there was little impact to the Internet as a whole, the          number of service providers that are multi-homed but              on Monday, October 20.59
delivered by Akamai’s IP Application Accelerator service           event served to underscore the challenges that surround          that send all of their outbound traffic through Cogent by
remained consistent throughout the duration of the                 monitoring for, and alerting on, significant route changes.      default. Consequently, this de-peering prevented traffic          Problems dealing with “flash crowd” traffic also caused
cable cut, as Akamai is able to identify and send traffic                                                                           originating from those users from reaching Sprint-                outages at a number of Web sites during the fourth
over alternative network paths on a real-time basis.                                                                                connected users. Unsurprisingly, Sprint PCS was one of            quarter. The Openoffice.org site crashed on October 14,
                                                                                                                                    the networks single-homed to Sprint’s network, meaning            due to overwhelming demand for its new 3.0 software
                                                                                                                                    that users of mobile devices using Sprint’s cell phone            release.60 The Europeana digital library enjoyed a high-
                                                                                                                                    services may have had problems connecting to Web sites            profile launch on November 20, but the system was
                                                                                                                                    and online services connected to Cogent.                          swamped by an unexpected 10 million user requests per
                                                                                                                                                                                                      hour and crashed within 24 hours of its launch.61 The
                                                                                                                                    Published reports53 indicated that the peering dispute            Web site for Dr. Pepper was unavailable for large parts
                                                                                                                                    was sourced in a disagreement over payments that Sprint           of the day on November 23, as the result of a surge of
                                                                                                                                    claimed it was owed for ongoing traffic exchange after a          traffic related to a one-day marketing promotion that
                                                                                                                                    peering trial that ended in September 2007 — Cogent’s             promised everyone in America a free bottle of soda if
                                                                                                                                    executives believed that the results of the trial had             the new Guns n’ Roses album was released during 2008.
                                                                                                                                    qualified them for settlement-free peering. However,              Dr. Pepper ultimately elected to extend the offer an extra
                                                                                                                                    on November 2, Sprint re-enabled the connection with              day and add more server capacity to handle the load.62
                                                                                                                                    Cogent,54 and on December 22, Sprint and Cogent                   Web sites can leverage the on-demand capacity available
Figure 7: Akamai Download Performance Remained Consistent Despite Cable Cut
                                                                                                                                    announced that they had reached a multi-year intercon-            through Akamai’s site delivery services to help them
                                                                                                                                    nection agreement for the purposes of exchanging                  avoid traffic-related site downtime or the need to add
                                                                                                                                    Internet traffic.55                                               additional server capacity.




12                                                                                                                                                                                                                                                            13
                                    © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                     © 2009 Akamai Technologies, Inc. All Rights Reserved
Section 3: Networks and Web Sites:
           Issues & Improvements (cont’d)

                                                                                                                                 3.5 Significant New Connectivity —
High traffic levels and application problems combined to             able for nearly three hours on November 18 while it                                                                             end-to-end connection — if a link is lost, the
                                                                                                                                     Undersea Cables
take various U.S. Postal Service Web-based services                  migrated to a new server facility.71 A “catastrophic”                                                                           communication node will store the information until
offline the week of December 8. Several different online             UPS failure caused a power outage on November 13 at         A report published in December by telecommunications                the connection is re-established.
tools, including the Postal Service’s popular Click-N-Ship           a Santa Clara data center operated by Quality Technology    research firm Telegeography noted74 that rapid growth in
service, suffered outages.63 Most tools were available               Services, triggering days of performance problems for       Internet capacity around the world over the last decade            Closer to Earth, O3b Networks continues to sign contracts
again by Monday afternoon, but the Click-N-Ship service              the social network Friendster. Although the hosting         has led to a diminished role for the United States as an           to bring Internet connectivity to remote regions using
was not fully functional again until Friday, December 12.64          facility was back on generator power within two hours,      Internet hub, with dramatic shifts in the amount of traffic        satellites in equatorial orbit. In December 2008, O3b
                                                                     Friendster remained offline for more than 23 hours over     that passes through the United States from other conti-            announced that Afghani telco Neda Telecommunications
A number of social networking and related sites                      a three day period.72                                       nents. Telegeography found that in 1999, 91% of data               will deploy its Quick Start service as a means for connect-
experienced varying amounts of downtime in the fourth                                                                            from Asia passed through the United States at some                 ing to the Internet, though service activation is not
quarter. The blog search engine Technorati experienced               Looking back across all of 2008, Pingdom published73        point on its journey, but by 2008, that had fallen to just         expected until late 2010.77 In Libya, users working or
both downtime and slower performance for more than                   a report entitled “Social Network Downtime in 2008,”        54%. In 1999, 70% of data from Africa passed through               located in remote areas now have access to satellite-
nine hours on December 12 and 13.65 Dating website                   which analyzed the Web site availability (uptime) of 15     the United States, but by 2008, that number decreased              based connectivity through portable satellite broadband
Match.com experienced technical difficulties and was                 of the world’s largest social networks. Pingdom noted       to just 6%. One key reason for this decline has been               terminals, with speeds up to 444 Kbps.78 Finally, in Dec-
unavailable for more than an hour and a half on October              that Facebook and MySpace, the two largest social           the growth in inter-regional connectivity made possible            ember, California-based Viasat announced a plan to put
29.66 Business networking site LinkedIn was down for                 networks monitored, both had very little downtime in        by numerous submarine cable projects, including those              a broadband Internet satellite into orbit above the U.S.
over an hour on October 10,67 and experienced an                     2008. Only four social networks that were monitored for     covered in previous editions of Akamai’s quarterly                 in the first half of 2011.79 According to Viasat, the sat-
additional hour-long outage on November 16.68 Hosted                 the full year achieved overall uptime of 99.9% or better:   State of the Internet reports.                                     ellite will have an overall throughput of 100 Gbps, which
blogging service Typepad was down for an hour on                     Facebook (99.92%), MySpace (99.94%), Classmates.com                                                                            it claims should enable it to support 2 Mbps service to
October 3,69 and micro-blogging service Twitter exper-               (99.95%), and Xanga (99.95%). Figure 8 illustrates the      In the Middle East, the Cyprus Telecommunications                  approximately 2 million subscribers when operational.
ienced a brief outage on November 13, lasting just under             aggregate downtime (in hours) that Pingdom observed         Authority (Cyta) and the Syrian Telecommunication                  Viasat’s plans parallel an effort by Eutelsat in Europe
an hour, due to a DNS configuration error.70 Popular                 for the social networks that it was monitoring.             Establishment (STE) have agreed75 to upgrade the                   to launch a high capacity broadband satellite in 2010.
blogging/social networking site LiveJournal was unavail-                                                                         UGARIT submarine cable link between Tartous in Syria
                                                                                                                                 and Pentaskhinos in Cyprus in order to increase Internet           Akamai’s 3rd Quarter, 2008 State of the Internet report
                                                                                                                                 capacity between the two countries. The 239km UGARIT               noted that Sprint-Nextel had launched the “Xohm”-
                                                                                                                                 cable began operations in 1995, and its transmission               branded WiMAX service in Baltimore, Maryland. During
                                                                                                                                 capacity is limited to 622 Mbps, which is also driving the         the fourth quarter, Sprint-Nextel completed the
                                                                                                                                 two companies to initiate feasibility studies for establish-       formation of a WiMAX joint venture with Clearwire,
                                                                                                                                 ing a second submarine link between their countries.               and re-branded the service as “Clear”.80 The first city
                                                                                                                                                                                                    expected to get the new “Clear” WiMAX service is
                                                                                                                                 3.6 Significant New Connectivity — Wireless                        Portland, Oregon in early January 2009.81
                                                                                                                                 Representing possibly the extreme in “wireless” Internet
                                                                                                                                 connections, in November 2008, NASA reported the first             Internationally, announcements of new WiMAX networks
                                                                                                                                 successful tests of its Deep Space Network, which is               surged in the fourth quarter of 2008. During the quarter,
                                                                                                                                 modeled after the Earth-bound Internet.76 The Deep                 Telegeography’s CommsUpdate daily briefings82 highlight-
                                                                                                                                 Space Network relies upon Disruption-Tolerant                      ed announcements of new or expanded WiMAX networks
Figure 8: Social Network Downtime in 2008, in hours (Data courtesy of Pingdom)
                                                                                                                                 Networking (DTN) that does not assume a continuous                 in Australia,83 Bahrain,84 Barbados,85 Bermuda,86 Brazil,87




14                                                                                                                                                                                                                                                          15
                                      © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                 © 2009 Akamai Technologies, Inc. All Rights Reserved
Section 3: Networks and Web Sites:
           Issues & Improvements (cont’d)

Cameroon,88 Iraq,89 Italy,90 Jordan,91 Kenya,92,93 Malaysia,94       Foundation whitepaper116 published in November.                 the government called on telecommunications                       However, by the end of the comment period in mid-
Montenegro,95 Netherlands,96 Pakistan,97 Romania,98                  According to the paper, the idea is that “Consumers may         providers119 to offer broadband services across all its           December, the United States Department of Commerce,
                                                                                                                                     territory for a maximum of €35 ($45.15) a month. This
South Africa,99 Spain,100 and Sri Lanka.101                          one day purchase and own fiber connections that run                                                                               the Australian government, members of the global bus-
                                                                     from their homes. They would then be able to connect            makes France the first country in the European Union              iness community, and over 200 commenters on the posted
Telegeography also highlighted the launch of 3G-based                to a variety of service providers, including today’s            to effectively mandate the supply of broadband services.          proposal expressed significant opposition to ICANN’s plan,
mobile broadband services in Canada,102 Japan,103 the                Internet, television, and telephone services, as well as        France Telecom and SFR plan to include broadband                  urging them to “go back to the drawing board and
United Kingdom,104 and Uzbekistan.105                                ultra-bandwidth intensive services of the future.” The          among their universal services by the end of 2009.                propose a process that results in a responsible expansion
                                                                     paper’s authors also propose that the fiber would form                                                                            of the name space, not merely a duplication of it.” 124
3.7 Significant New Connectivity —                                   part of the property right in the home. However, they           In the United States, an economic stimulus bill signed in
    Fixed Broadband                                                                                                                                                                                    3.9 IPv6
                                                                     note that no market for consumer purchase of fiber              February 2009 reportedly provides $7.2 billion devoted
The launch of DOCSIS 3.0 is enabling cable providers                 currently exists, but they are looking at one trial that is     to broadband funding, aimed at creating incentives for            According to published reports, the adoption of IPv6
to roll out higher-speed connectivity options to their               already ongoing in Ottawa, Canada as a means to test            additional infrastructure buildout and the development            continued a slow, steady growth into the end of 2008.
customers, with Comcast106 announcing availability of                their model’s feasibility and identify associated challenges    of a comprehensive national broadband plan by the                 A blog post125 at Internet infrastructure news & opinion
service tiers up to 50 Mbps in multiple cities across the            and insights.                                                   FCC.120 This “broadband stimulus” will be examined in             site CircleID notes that at the end of the year, 4% of
                                                                                                                                     more detail in Akamai’s 1st Quarter, 2009 State of the
United States; Virgin Media107 in the United Kingdom                                                                                                                                                   autonomous systems on the Internet supported IPv6,
                                                                                                                                     Internet report.
launching a 50 Mbps service; and UPC Netherlands108                  Also in Canada, the Saskatchewan government                                                                                       up from 2.4% at the beginning of 2008. In addition,
offering access at speeds of 60-120 Mbps.                            announced in late November that they aim to have                                                                                  the Number Resource Organization (NRO), which is made
                                                                                                                                     3.8 DNS Expansion
                                                                     100% broadband coverage across the Canadian territory                                                                             up of the five Regional Internet Registries (RIRs), announ-
                                                                                                                                     According to the Domain Name Industry Brief report
A number of announcements were also made regarding                   within three years under a new CAD $129 million                                                                                   ced126 in early December that the rate of new entrants
fiber-to-the-home (FTTH) initiatives in several countries.           infrastructure rollout plan. Regional incumbent telecom         published121 by VeriSign, 2008 ended with a total of              into the IPv6 routing system has increased by approx-
In Switzerland, Swisscom began to connect households                 SaskTel’s fixed broadband network footprint will be             177 million domain name registrations across all of the           imately 300 percent over the past two years. Additional
to the neighborhood fiber-optic nodes they had pre-                  expanded to cover 100% of the population, up from               Top Level Domains (TLDs), representing 16% growth                 IPv6 statistics presented at the RIPE 57 meeting in
viously deployed.109 In an interesting move, Swisscom will           86% coverage today, through an expansion of the                 over the previous year and 2% growth over the third               October were highlighted in another127 CircleID blog
be laying several fibers per household to enable invited             existing CommunityNet high speed network, upgraded              quarter of 2008. More than 10.1 million new domain                post, including data on IPv6 traffic by country, OS
partners in the telecommunications, cable, and utilities             rural backbone infrastructure, and a partnership with a         names were registered across all of the TLDs in the fourth        support, access methods, and IPv6-related latency.
industries to expand their own fiber-optic infrastructure.           satellite firm in order to provide access to the most           quarter of 2008, reflecting slower growth in new regis-
One fiber will be used by Swisscom, while the others will            remote areas.117                                                trations, with a decline of 12% from the third quarter.           However, research presented at the Proceedings of the
be made available to the potential partners. In November,                                                                                                                                              ACM Internet Measurement Conference, based on what
                                                                                                                                     As highlighted in the 2nd Quarter, 2008 State of the
Netherlands telco KPN and FTTH operator Reggefiber                   Similarly, in November, Finland’s government said118 that                                                                         the researchers claim is “the first complete census of the
                                                                     it will invest up to €66 million ($85.2 million) as part of     Internet report, in October, ICANN published a draft
said that they are planning to roll out a FTTH network                                                                                                                                                 Internet in more than two decades”, discovered a surpri-
that could cost as much as 7 billion euros that is planned           plans to increase high speed broadband coverage across         “Applicant Guidebook” for new generic TLDs, and posted             sing number of unused IPv4 addresses and concluded
to cover pretty much every part of the Netherlands.110               the country. The investment is part of an effort to             it online for review and comment.122 According                    that many will still be unused in two years when IPv4
Additional FTTH service announcements were made by                   increase access to 100 Mbps connectivity in Finland to          to published reports,123 ICANN would charge groups                address space was projected to be exhausted.128 “There
Brasil Telecom (Brazil),111 MTNL (India),112 Telefonica              100% of the population by 2016. The expectation is that         $185,000 to apply for a generic TLD, with most of the             are huge chunks of IP space which are not allocated yet,
(Spain),113 Telecom Italia (Italy),114 and TTK (Russia).115          by 2015, approximately 95% of the population will have          money going toward evaluation of the application.                 and also giant swaths which are inefficiently allocated,”
                                                                     access to the higher broadband speeds through commer-           ICANN’s plan would open up TLDs to non-English                    the researchers noted.
Also in the fourth quarter, the notion of “homes with                cial development, and by 2010 all broadband users are           character sets, and seeks to streamline a TLD-creation
tails” began to take root, popularized in a New America              expected to be able to receive at least 1 Mbps. In France,      process that has proven cumbersome in the past.




16                                                                                                                                                                                                                                                             17
                                      © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                    © 2009 Akamai Technologies, Inc. All Rights Reserved
Akamai State of the Internet Q4 2008
Akamai State of the Internet Q4 2008
Akamai State of the Internet Q4 2008
Akamai State of the Internet Q4 2008
Akamai State of the Internet Q4 2008
Akamai State of the Internet Q4 2008
Akamai State of the Internet Q4 2008
Akamai State of the Internet Q4 2008
Akamai State of the Internet Q4 2008

Weitere ähnliche Inhalte

Was ist angesagt?

Akamai Q1 2012 State of the Internet Report
Akamai Q1 2012 State of the Internet ReportAkamai Q1 2012 State of the Internet Report
Akamai Q1 2012 State of the Internet ReportDavid Belson
 
Akamai State of the Internet Report, Q2 2012
Akamai State of the Internet Report, Q2 2012Akamai State of the Internet Report, Q2 2012
Akamai State of the Internet Report, Q2 2012Akamai Technologies
 
Akamai State of the Internet Report, Q3 2012
Akamai State of the Internet Report, Q3 2012Akamai State of the Internet Report, Q3 2012
Akamai State of the Internet Report, Q3 2012Akamai Technologies
 
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11Retelur Marketing
 
SAMENA Response to Iraq CMC fixed wireless consultation
SAMENA Response to Iraq CMC fixed wireless consultationSAMENA Response to Iraq CMC fixed wireless consultation
SAMENA Response to Iraq CMC fixed wireless consultationroberto ercole
 

Was ist angesagt? (8)

Akamai Q1 2012 State of the Internet Report
Akamai Q1 2012 State of the Internet ReportAkamai Q1 2012 State of the Internet Report
Akamai Q1 2012 State of the Internet Report
 
Akamai State of the Internet Report, Q2 2012
Akamai State of the Internet Report, Q2 2012Akamai State of the Internet Report, Q2 2012
Akamai State of the Internet Report, Q2 2012
 
Akamai State of the Internet Report, Q3 2012
Akamai State of the Internet Report, Q3 2012Akamai State of the Internet Report, Q3 2012
Akamai State of the Internet Report, Q3 2012
 
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11
 
SAMENA Response to Iraq CMC fixed wireless consultation
SAMENA Response to Iraq CMC fixed wireless consultationSAMENA Response to Iraq CMC fixed wireless consultation
SAMENA Response to Iraq CMC fixed wireless consultation
 
Akamai q111
Akamai q111Akamai q111
Akamai q111
 
Internet
InternetInternet
Internet
 
Wireless broadband spectrum in the EU
Wireless broadband spectrum in the EUWireless broadband spectrum in the EU
Wireless broadband spectrum in the EU
 

Andere mochten auch

Führung im Gesundheitswesen
Führung im GesundheitswesenFührung im Gesundheitswesen
Führung im GesundheitswesenFrank Edelkraut
 
Design Matters: Industrial Design & Product Styling in Wearable Tech
Design Matters: Industrial Design & Product Styling in Wearable TechDesign Matters: Industrial Design & Product Styling in Wearable Tech
Design Matters: Industrial Design & Product Styling in Wearable TechChristopher Grayson
 
Wicked ambiguity-content-strategy-140518173929-phpapp02
Wicked ambiguity-content-strategy-140518173929-phpapp02Wicked ambiguity-content-strategy-140518173929-phpapp02
Wicked ambiguity-content-strategy-140518173929-phpapp02Vera Kovaleva
 
Ecofolio - livret prescripteurs
Ecofolio - livret prescripteursEcofolio - livret prescripteurs
Ecofolio - livret prescripteursChristian Giordano
 
10 Monsters from a Content Marketer’s Nightmare: A Halloween SlideSCARE
10 Monsters from a Content Marketer’s Nightmare: A Halloween SlideSCARE10 Monsters from a Content Marketer’s Nightmare: A Halloween SlideSCARE
10 Monsters from a Content Marketer’s Nightmare: A Halloween SlideSCAREUberflip
 
LeSS Study material (LeSS introduction)
LeSS Study material (LeSS introduction)LeSS Study material (LeSS introduction)
LeSS Study material (LeSS introduction)Yasui Tsutomu
 
Ready4S portfolio
Ready4S portfolioReady4S portfolio
Ready4S portfolioReady4S
 
для клиентов франчайзинг
для клиентов франчайзингдля клиентов франчайзинг
для клиентов франчайзингMarina Kirilyuk
 
Working While Pregnant: 7 Most Pressing Questions Answered
Working While Pregnant: 7 Most Pressing Questions AnsweredWorking While Pregnant: 7 Most Pressing Questions Answered
Working While Pregnant: 7 Most Pressing Questions Answeredlawsuitlegal
 
Leveraging Social Media Optimization for Online Marketing
Leveraging Social Media Optimization for Online MarketingLeveraging Social Media Optimization for Online Marketing
Leveraging Social Media Optimization for Online MarketingTom Walls
 
Kk dengan jamban yang sehat dari 5 kota
Kk dengan jamban yang sehat dari 5 kotaKk dengan jamban yang sehat dari 5 kota
Kk dengan jamban yang sehat dari 5 kotawely supriatna
 
What’s next for the next generation of Recruiter? | Talent Connect 2016
What’s next for the next generation of Recruiter? | Talent Connect 2016What’s next for the next generation of Recruiter? | Talent Connect 2016
What’s next for the next generation of Recruiter? | Talent Connect 2016LinkedIn Talent Solutions
 
Retail Loyalty Congress 2016 // Masterclass IceMobile
Retail Loyalty Congress 2016 // Masterclass IceMobile Retail Loyalty Congress 2016 // Masterclass IceMobile
Retail Loyalty Congress 2016 // Masterclass IceMobile Anna Witteman
 
Raspberry pi 用アクセサリ
Raspberry pi 用アクセサリRaspberry pi 用アクセサリ
Raspberry pi 用アクセサリTsuyoshi Horigome
 
Careering: Reflexivity, play and a life in the media - Pat Kane
Careering: Reflexivity, play and a life in the media - Pat KaneCareering: Reflexivity, play and a life in the media - Pat Kane
Careering: Reflexivity, play and a life in the media - Pat Kanewww.patkane.global
 
Accelerated Startup - Traction Camp, Mavrovo, Macedonia - June 2015
Accelerated Startup - Traction Camp, Mavrovo, Macedonia - June 2015Accelerated Startup - Traction Camp, Mavrovo, Macedonia - June 2015
Accelerated Startup - Traction Camp, Mavrovo, Macedonia - June 2015Vitaly Golomb
 
"Perspective-Based Learning Through Role-Playing Curriculum Design" by Sherry...
"Perspective-Based Learning Through Role-Playing Curriculum Design" by Sherry..."Perspective-Based Learning Through Role-Playing Curriculum Design" by Sherry...
"Perspective-Based Learning Through Role-Playing Curriculum Design" by Sherry...Sherry Jones
 

Andere mochten auch (20)

My LinkedIn Accolade Feb-2013
My LinkedIn Accolade Feb-2013My LinkedIn Accolade Feb-2013
My LinkedIn Accolade Feb-2013
 
Führung im Gesundheitswesen
Führung im GesundheitswesenFührung im Gesundheitswesen
Führung im Gesundheitswesen
 
Natural beauty
Natural beautyNatural beauty
Natural beauty
 
Design Matters: Industrial Design & Product Styling in Wearable Tech
Design Matters: Industrial Design & Product Styling in Wearable TechDesign Matters: Industrial Design & Product Styling in Wearable Tech
Design Matters: Industrial Design & Product Styling in Wearable Tech
 
Wicked ambiguity-content-strategy-140518173929-phpapp02
Wicked ambiguity-content-strategy-140518173929-phpapp02Wicked ambiguity-content-strategy-140518173929-phpapp02
Wicked ambiguity-content-strategy-140518173929-phpapp02
 
Ecofolio - livret prescripteurs
Ecofolio - livret prescripteursEcofolio - livret prescripteurs
Ecofolio - livret prescripteurs
 
10 Monsters from a Content Marketer’s Nightmare: A Halloween SlideSCARE
10 Monsters from a Content Marketer’s Nightmare: A Halloween SlideSCARE10 Monsters from a Content Marketer’s Nightmare: A Halloween SlideSCARE
10 Monsters from a Content Marketer’s Nightmare: A Halloween SlideSCARE
 
LeSS Study material (LeSS introduction)
LeSS Study material (LeSS introduction)LeSS Study material (LeSS introduction)
LeSS Study material (LeSS introduction)
 
Ready4S portfolio
Ready4S portfolioReady4S portfolio
Ready4S portfolio
 
для клиентов франчайзинг
для клиентов франчайзингдля клиентов франчайзинг
для клиентов франчайзинг
 
Working While Pregnant: 7 Most Pressing Questions Answered
Working While Pregnant: 7 Most Pressing Questions AnsweredWorking While Pregnant: 7 Most Pressing Questions Answered
Working While Pregnant: 7 Most Pressing Questions Answered
 
Leveraging Social Media Optimization for Online Marketing
Leveraging Social Media Optimization for Online MarketingLeveraging Social Media Optimization for Online Marketing
Leveraging Social Media Optimization for Online Marketing
 
Kk dengan jamban yang sehat dari 5 kota
Kk dengan jamban yang sehat dari 5 kotaKk dengan jamban yang sehat dari 5 kota
Kk dengan jamban yang sehat dari 5 kota
 
Zaragoza turismo-61
Zaragoza turismo-61Zaragoza turismo-61
Zaragoza turismo-61
 
What’s next for the next generation of Recruiter? | Talent Connect 2016
What’s next for the next generation of Recruiter? | Talent Connect 2016What’s next for the next generation of Recruiter? | Talent Connect 2016
What’s next for the next generation of Recruiter? | Talent Connect 2016
 
Retail Loyalty Congress 2016 // Masterclass IceMobile
Retail Loyalty Congress 2016 // Masterclass IceMobile Retail Loyalty Congress 2016 // Masterclass IceMobile
Retail Loyalty Congress 2016 // Masterclass IceMobile
 
Raspberry pi 用アクセサリ
Raspberry pi 用アクセサリRaspberry pi 用アクセサリ
Raspberry pi 用アクセサリ
 
Careering: Reflexivity, play and a life in the media - Pat Kane
Careering: Reflexivity, play and a life in the media - Pat KaneCareering: Reflexivity, play and a life in the media - Pat Kane
Careering: Reflexivity, play and a life in the media - Pat Kane
 
Accelerated Startup - Traction Camp, Mavrovo, Macedonia - June 2015
Accelerated Startup - Traction Camp, Mavrovo, Macedonia - June 2015Accelerated Startup - Traction Camp, Mavrovo, Macedonia - June 2015
Accelerated Startup - Traction Camp, Mavrovo, Macedonia - June 2015
 
"Perspective-Based Learning Through Role-Playing Curriculum Design" by Sherry...
"Perspective-Based Learning Through Role-Playing Curriculum Design" by Sherry..."Perspective-Based Learning Through Role-Playing Curriculum Design" by Sherry...
"Perspective-Based Learning Through Role-Playing Curriculum Design" by Sherry...
 

Ähnlich wie Akamai State of the Internet Q4 2008

Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008guest190b7a
 
Whitepapers Akamai State Of The Internet Q2 2008
Whitepapers Akamai State Of The Internet Q2 2008Whitepapers Akamai State Of The Internet Q2 2008
Whitepapers Akamai State Of The Internet Q2 2008guest190b7a
 
Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008JOSÉ RAMON CARIAS
 
Http Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...
Http   Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...Http   Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...
Http Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...jash222
 
Akamai - State of the Internet (Q4 2009)
Akamai - State of the Internet (Q4 2009)Akamai - State of the Internet (Q4 2009)
Akamai - State of the Internet (Q4 2009)Constantin Cocioaba
 
Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)Constantin Cocioaba
 
Akamai´s State of the Internet
Akamai´s State of the Internet Akamai´s State of the Internet
Akamai´s State of the Internet Carlos Diaz Warns
 
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the InternetAkamai Technologies
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysShah Sheikh
 
Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012C. Keiko Funahashi
 
State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012Akamai Technologies
 
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1Akamai Technologies
 
Akamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. ÇeyrekAkamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. ÇeyrekWebrazzi
 
Akamai's State of the Internet
Akamai's State of the InternetAkamai's State of the Internet
Akamai's State of the InternetAlvaro Quesada
 
Akamai State of the Internet Report, Q1 2012
Akamai State of the Internet Report, Q1 2012Akamai State of the Internet Report, Q1 2012
Akamai State of the Internet Report, Q1 2012Akamai Technologies
 
Akamai soti q213_exec_summary
Akamai soti q213_exec_summaryAkamai soti q213_exec_summary
Akamai soti q213_exec_summaryMiguel Angel
 
The State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive SummaryThe State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive SummaryAkamai Technologies
 
Study_Paper_akamai_network.pdf
Study_Paper_akamai_network.pdfStudy_Paper_akamai_network.pdf
Study_Paper_akamai_network.pdfZeelPatel559214
 
The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report Akamai Technologies
 

Ähnlich wie Akamai State of the Internet Q4 2008 (20)

Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008
 
Whitepapers Akamai State Of The Internet Q2 2008
Whitepapers Akamai State Of The Internet Q2 2008Whitepapers Akamai State Of The Internet Q2 2008
Whitepapers Akamai State Of The Internet Q2 2008
 
Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008
 
Http Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...
Http   Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...Http   Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...
Http Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...
 
Akamai - State of the Internet (Q4 2009)
Akamai - State of the Internet (Q4 2009)Akamai - State of the Internet (Q4 2009)
Akamai - State of the Internet (Q4 2009)
 
Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)
 
Akamai´s State of the Internet
Akamai´s State of the Internet Akamai´s State of the Internet
Akamai´s State of the Internet
 
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
 
Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012
 
State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012
 
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
 
Akamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. ÇeyrekAkamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. Çeyrek
 
Akamai's State of the Internet
Akamai's State of the InternetAkamai's State of the Internet
Akamai's State of the Internet
 
Akamai State of the Internet Report, Q1 2012
Akamai State of the Internet Report, Q1 2012Akamai State of the Internet Report, Q1 2012
Akamai State of the Internet Report, Q1 2012
 
Akamai soti q213_exec_summary
Akamai soti q213_exec_summaryAkamai soti q213_exec_summary
Akamai soti q213_exec_summary
 
The State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive SummaryThe State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive Summary
 
Study_Paper_akamai_network.pdf
Study_Paper_akamai_network.pdfStudy_Paper_akamai_network.pdf
Study_Paper_akamai_network.pdf
 
The State of Internet
The State of InternetThe State of Internet
The State of Internet
 
The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report
 

Mehr von Amit Ranjan

How stupid can we get.pdf
How stupid can we get.pdfHow stupid can we get.pdf
How stupid can we get.pdfAmit Ranjan
 
Pics - World Government Summit Dubai (#WGS2023).pptx
Pics - World Government Summit Dubai (#WGS2023).pptxPics - World Government Summit Dubai (#WGS2023).pptx
Pics - World Government Summit Dubai (#WGS2023).pptxAmit Ranjan
 
Evaluating New Age Startups: Profitability Vs Growth
Evaluating New Age Startups: Profitability Vs GrowthEvaluating New Age Startups: Profitability Vs Growth
Evaluating New Age Startups: Profitability Vs GrowthAmit Ranjan
 
The Art and Science of Building World Class Technology Products
The Art and Science of Building World Class Technology ProductsThe Art and Science of Building World Class Technology Products
The Art and Science of Building World Class Technology ProductsAmit Ranjan
 
Demo: How to get your Digital Aadhaar (eAadhaar) in DigiLocker
Demo: How to get your Digital Aadhaar (eAadhaar) in DigiLockerDemo: How to get your Digital Aadhaar (eAadhaar) in DigiLocker
Demo: How to get your Digital Aadhaar (eAadhaar) in DigiLockerAmit Ranjan
 
How Users Can Get their Digital Driving License & Vehicle Registration from D...
How Users Can Get their Digital Driving License & Vehicle Registration from D...How Users Can Get their Digital Driving License & Vehicle Registration from D...
How Users Can Get their Digital Driving License & Vehicle Registration from D...Amit Ranjan
 
Government of India Gazette Notification - The Information Technology (Preser...
Government of India Gazette Notification - The Information Technology (Preser...Government of India Gazette Notification - The Information Technology (Preser...
Government of India Gazette Notification - The Information Technology (Preser...Amit Ranjan
 
Policy on Open Application Programming Interfaces (APIs) for Government of India
Policy on Open Application Programming Interfaces (APIs) for Government of IndiaPolicy on Open Application Programming Interfaces (APIs) for Government of India
Policy on Open Application Programming Interfaces (APIs) for Government of IndiaAmit Ranjan
 
Policy on Adoption of Open Source Software for Government of India
Policy on Adoption of Open Source Software for Government of IndiaPolicy on Adoption of Open Source Software for Government of India
Policy on Adoption of Open Source Software for Government of IndiaAmit Ranjan
 
India Stack - Social Impact at Scale
India Stack - Social Impact at ScaleIndia Stack - Social Impact at Scale
India Stack - Social Impact at ScaleAmit Ranjan
 
Technical Specifications DLTS Ver 2.3
Technical Specifications DLTS Ver 2.3Technical Specifications DLTS Ver 2.3
Technical Specifications DLTS Ver 2.3Amit Ranjan
 
eSign Brochure v1.5
eSign Brochure v1.5eSign Brochure v1.5
eSign Brochure v1.5Amit Ranjan
 
Digital Locker User Manual
Digital Locker User ManualDigital Locker User Manual
Digital Locker User ManualAmit Ranjan
 
Digital Locker Requester API Specification v1 0
Digital Locker Requester API Specification v1 0Digital Locker Requester API Specification v1 0
Digital Locker Requester API Specification v1 0Amit Ranjan
 
Digital Locker Intro Deck
Digital Locker Intro DeckDigital Locker Intro Deck
Digital Locker Intro DeckAmit Ranjan
 
Digital Locker Dedicated Repository API Specification v1 4
Digital Locker Dedicated Repository API Specification v1 4Digital Locker Dedicated Repository API Specification v1 4
Digital Locker Dedicated Repository API Specification v1 4Amit Ranjan
 
Bulk and Run Time Digital Signing v1.0
Bulk and Run Time Digital Signing v1.0Bulk and Run Time Digital Signing v1.0
Bulk and Run Time Digital Signing v1.0Amit Ranjan
 

Mehr von Amit Ranjan (20)

How stupid can we get.pdf
How stupid can we get.pdfHow stupid can we get.pdf
How stupid can we get.pdf
 
doc sample.docx
doc sample.docxdoc sample.docx
doc sample.docx
 
designing.ppt
designing.pptdesigning.ppt
designing.ppt
 
turef67wea.pptx
turef67wea.pptxturef67wea.pptx
turef67wea.pptx
 
Pics - World Government Summit Dubai (#WGS2023).pptx
Pics - World Government Summit Dubai (#WGS2023).pptxPics - World Government Summit Dubai (#WGS2023).pptx
Pics - World Government Summit Dubai (#WGS2023).pptx
 
Evaluating New Age Startups: Profitability Vs Growth
Evaluating New Age Startups: Profitability Vs GrowthEvaluating New Age Startups: Profitability Vs Growth
Evaluating New Age Startups: Profitability Vs Growth
 
The Art and Science of Building World Class Technology Products
The Art and Science of Building World Class Technology ProductsThe Art and Science of Building World Class Technology Products
The Art and Science of Building World Class Technology Products
 
Demo: How to get your Digital Aadhaar (eAadhaar) in DigiLocker
Demo: How to get your Digital Aadhaar (eAadhaar) in DigiLockerDemo: How to get your Digital Aadhaar (eAadhaar) in DigiLocker
Demo: How to get your Digital Aadhaar (eAadhaar) in DigiLocker
 
How Users Can Get their Digital Driving License & Vehicle Registration from D...
How Users Can Get their Digital Driving License & Vehicle Registration from D...How Users Can Get their Digital Driving License & Vehicle Registration from D...
How Users Can Get their Digital Driving License & Vehicle Registration from D...
 
Government of India Gazette Notification - The Information Technology (Preser...
Government of India Gazette Notification - The Information Technology (Preser...Government of India Gazette Notification - The Information Technology (Preser...
Government of India Gazette Notification - The Information Technology (Preser...
 
Policy on Open Application Programming Interfaces (APIs) for Government of India
Policy on Open Application Programming Interfaces (APIs) for Government of IndiaPolicy on Open Application Programming Interfaces (APIs) for Government of India
Policy on Open Application Programming Interfaces (APIs) for Government of India
 
Policy on Adoption of Open Source Software for Government of India
Policy on Adoption of Open Source Software for Government of IndiaPolicy on Adoption of Open Source Software for Government of India
Policy on Adoption of Open Source Software for Government of India
 
India Stack - Social Impact at Scale
India Stack - Social Impact at ScaleIndia Stack - Social Impact at Scale
India Stack - Social Impact at Scale
 
Technical Specifications DLTS Ver 2.3
Technical Specifications DLTS Ver 2.3Technical Specifications DLTS Ver 2.3
Technical Specifications DLTS Ver 2.3
 
eSign Brochure v1.5
eSign Brochure v1.5eSign Brochure v1.5
eSign Brochure v1.5
 
Digital Locker User Manual
Digital Locker User ManualDigital Locker User Manual
Digital Locker User Manual
 
Digital Locker Requester API Specification v1 0
Digital Locker Requester API Specification v1 0Digital Locker Requester API Specification v1 0
Digital Locker Requester API Specification v1 0
 
Digital Locker Intro Deck
Digital Locker Intro DeckDigital Locker Intro Deck
Digital Locker Intro Deck
 
Digital Locker Dedicated Repository API Specification v1 4
Digital Locker Dedicated Repository API Specification v1 4Digital Locker Dedicated Repository API Specification v1 4
Digital Locker Dedicated Repository API Specification v1 4
 
Bulk and Run Time Digital Signing v1.0
Bulk and Run Time Digital Signing v1.0Bulk and Run Time Digital Signing v1.0
Bulk and Run Time Digital Signing v1.0
 

Kürzlich hochgeladen

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Akamai State of the Internet Q4 2008

  • 1. Volume 1, Number 4 4th Quarter, 2008 The State of the Internet RT PO RE
  • 2. Executive Summary Each quarter, Akamai will be publishing a quarterly “State of the Internet” report. This report will include data gathered from across Akamai’s global server network about attack traffic and broadband adoption, as well as trends seen in this data over time. It will also aggregate publicly available news and information about notable events seen throughout the quarter, including Denial of Service attacks, Web site hacks, and network events, including outages and new connections. During the fourth quarter of 2008, Akamai observed attack traffic originating from 193 unique countries around the world. The United States and China were the two largest attack traffic sources, accounting for over 42% of observed traffic in total. Akamai observed attack traffic targeted at more than 20,000 unique ports, with the top 10 ports seeing over 77% of the observed attack traffic. Web site hacks and Web-based exploits were regularly in the news during the quarter, as was a proof-of-concept exploit for a vulnerability in SSL, the underlying mechanism that secures financial and retail transactions, among others, across the Web. Notable network outages in the fourth quarter were due to submarine cables in the Mediterranean being severed, as well as two major Internet backbone providers de-peering their networks from one another. Notable Web site outages in the fourth quarter were attributed to increased traffic, hardware failure, and power outages. Global connectivity advanced in the fourth quarter, with the commercial launch or announcement of WiMAX and 3G broadband services in a number of countries, the launch of higher speed cable broadband services based on DOCSIS 3.0, and additional fiber-to-the- home services that will bring extremely high-speed connections to subscribers in Switzerland, Brazil, India, Spain, Italy, and Russia. Akamai observed a nearly six percent increase (from the third quarter 2008) globally in the number of unique IP addresses connecting to Akamai’s network, and a 28% increase from the end of 2007. From a global connection speed perspective, South Korea had the highest levels of “high broadband” (>5 Mbps) connectivity for the fourth consecutive quarter, and the highest average connection speed, at 15 Mbps. In the United States, Delaware also maintained its top position, with 62% of connections to Akamai occurring at 5 Mbps or greater, and the highest average connection speed in the United States, at 7.3 Mbps. Looking at observed “narrowband” (<256 Kbps) connections, Mayotte and Equatorial Guinea were the “slowest” countries, with 98% and 96% of connections to Akamai, respectively, occurring at speeds below 256 Kbps. In the United States, the District of Columbia continued to have the highest percentage of observed connections below 256 Kbps. However, this was down nearly seven percent from the prior quarter, and over 42% from the end of 2007. The “spinning globe” featured in the Akamai NOCC represents where Akamai servers are located and how much traffic they are seeing.
  • 3. Table of Contents Introduction 1: IntroductIon 3 2: SecurIty 4 Akamai’s globally distributed network of servers allows us to gather massive 2.1 Attack Traffic, Top Originating Countries 4 amounts of information on many metrics, including connection speeds, attack 2.2 Attack Traffic, Top Target Ports 5 traffic, and network connectivity/availability/latency problems, as well as user 2.3 Attack Traffic, By Day 6 behavior and traffic patterns on leading Web sites. 2.4 Distributed Denial of Services (DDoS) Attacks 8 2.5 Web Site Hacks & Web-Based Exploits 8 In the fourth quarter of 2008, observed distributed denial of service (DDoS) 2.6 TCP-Based Attacks 9 attack traffic continued to target a consistent set of ports, though it appears 2.7 McColo Shutdown 9 that some are now being targeted by a new set of network worms. In addition, 2.8 SSL Vulnerability 10 it appears that spikes in attack traffic may be correlated with patch releases or 2.9 DNSSEC 10 security advisories issued by Microsoft, as hackers rush to exploit vulnerabilities 3: networkS and web SIteS: ISSueS & ImprovementS 11 before system administrators can apply software patches. 3.1 Network Outages 11 3.2 Routing Issues 12 Two large-scale network outages occurred during the quarter, as undersea 3.3 Peering Issues 13 cables were once again severed in the Mediterranean, and as Sprint-Nextel 3.4 Web Site Outages 13 de-peered their network from Cogent Communications. However, global 3.5 Significant New Connectivity — Undersea Cables 15 3.6 Significant New Connectivity — Wireless 15 connectivity continued to become more robust, with new WiMAX and 3G 3.7 Significant New Connectivity — Fixed Broadband 16 mobile broadband services being announced or launching in a number of 3.8 DNS Expansion 17 countries, and the introduction of DOCSIS 3.0 services and additional fiber- 3.9 IPv6 17 to-the-home initiatives, which are bringing higher speed connectivity to 4: Internet penetratIon 18 subscribers in multiple countries. 4.1 Unique IP Addresses Seen By Akamai 18 4.2 Internet Penetration, Global 19 In the fourth quarter, six countries connected to Akamai’s network at average 4.3 Internet Penetration, United States 20 speeds in excess of 5 Mbps, and for the year, many countries showed 5: GeoGraphy 21 significant increases in their levels of high broadband (>5 Mbps) adoption. 5.1 Average Connection Speeds, Global 21 Decreases in the percentage of narrowband (<256 Kbps) connections to 5.2 Average Connection Speeds, United States 21 Akamai were also seen both internationally and in the United States, likely due, 5.3 High Broadband Connectivity: Fastest International Countries 24 in part, to the growth in availability of, and options for, broadband connectivity. 5.4 High Broadband Connectivity: Fastest U.S. States 25 5.5 Broadband Connectivity: Fast International Countries 26 5.6 Broadband Connectivity: Fast U.S. States 27 5.7 Narrowband Connectivity: Slowest International Countries 28 5.8 Narrowband Connectivity: Slowest U.S. States 29 6: appendIX: Selected InternatIonal data 30 7: endnoteS 31 2 3 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved
  • 4. Section 2: Security 2.1 Attack Traffic, Top Originating Countries Akamai maintains a distributed set of agents deployed In December, IT security firm Sophos published1 its destined for over 20,200 unique ports. Obviously, there is Security Threat Report 2009, which examined the security across the Internet that serve to monitor attack traffic. a significant “long tail” that occurs – the top 200 target During the fourth quarter of 2008, Akamai observed Based on the data collected by these agents, Akamai threat landscape over the course of 2008. The report ports only account for 73% of the observed attack traffic attack traffic originating from 193 unique countries is able to identify the top countries from which attack noted that the top 5 malware-hosting countries in 2008 from the United States. around the world, up nearly 8% from the third quarter traffic originates, as well as the top ports targeted consisted of the United States, China (including Hong count of 179 countries. This quarter, the United States by these attacks. (Ports are network layer protocol Kong), Russia, Germany, and South Korea. It is interest- For the third consecutive quarter, Port 445 (Microsoft- moved into the first place slot for the first time in 2008, identifiers.) This section, in part, provides insight into ing to note that these countries have also all consistently DS) held the first place spot, with a slightly higher after placing second to China or Japan throughout Internet attack traffic, as observed and measured by been among the top 10 countries from which Akamai percentage of the overall observed traffic than in the the year. Argentina returned to the top 10 again in the Akamai, during the fourth quarter of 2008. While has observed attack traffic originating in during 2008. third quarter, and still below second quarter levels. This fourth quarter — it was ranked fifth for first quarter some quarter-over-quarter trending may be discussed, port represented over half of the attack traffic observed attack traffic. Throughout 2008, the United States, 2.2 Attack Traffic, Top Target Ports it is expected that both the top countries and top from Argentina in the fourth quarter, approximately a China, Taiwan, South Korea, and Japan were consistently ports will change on a quarterly basis. During the fourth quarter of 2008, Akamai observed quarter of the attack traffic from the United States and among the top 10 countries that generated the highest attack traffic targeted at just over 20,800 unique Russia, and around a third of observed attack traffic percentages of attack traffic. This section also includes information on selected DDoS ports, over eight times more than in the third quarter. coming from Taiwan, Japan, Brazil, and Germany. While attacks, Web site hacking attempts, Web-based exploits, Consistent with prior quarters, some of the attack traffic this port was previously associated with the Sasser The trend in attack traffic distribution continues to be and other attacks and events as published in the media targeted services on well-known ports. Due to the worm, it appears that it is also2 associated with the relatively consistent with the prior quarters, with the during the fourth quarter of 2008. Note that Akamai significant growth in port count, the attack traffic was Gimmiv.A worm, which exploited a vulnerability3 that top 10 countries as the source for just under 72% of does not release information on attacks on specific slightly less concentrated than in prior quarters, with the was considered to be significant enough to ultimately be observed attack traffic. (This is down slightly from prior customer sites and that selected published reports are top 10 ports responsible for only 77% of the observed addressed by Microsoft in a patch4 released outside of quarters, where the top 10 countries accounted for simply compiled here. attack traffic. (This is down from an 85% or greater their normal “Patch Tuesday” cycle. The Conficker worm 74-78% of observed attack traffic.) The list of countries concentration during prior quarters of 2008.) While it is reported to also be using Port 445 and exploiting within the top 10 appears to be getting more consistent, is unclear exactly what is accounting for the growth in this same vulnerability to spread across the Internet. as observed across 2008 — the five countries listed above targeted port count, data from fourth quarter monitoring The Conficker worm will be covered in more detail in appeared in the list during all four quarters, while Russia, Akamai’s 1st Quarter, 2009 State of the Internet report. shows that the United States is clearly responsible for this Germany, and Brazil each held spots in the top 10 during growth during the quarter, with originating attack traffic three of the four quarters in 2008. Destination Port Use % Traffic Q3 08 % Country % Traffic Q3 08 % 7 Microsoft-DS OTHER 3 Port 1 united States 22.85 19.68 445 microsoft-dS 22.96 21.12 2 china 19.30 26.85 9 80 www 14.51 9.18 8 3 Sweden 10.67 3.86 SMTP 139 netbIoS 11.56 21.09 4 taiwan 5.61 2.54 22 SSh 10.78 9.73 5 South korea 2.52 9.37 GhostSurf 135 microsoft-rpc 7.15 10.68 6 argentina 2.51 0.39 1 VNC Server 1433 microsoft SQl Server 2.46 3.20 7 russia 2.33 1.94 5 8000 (multiple) 2.14 0.87 8 Germany 2.15 2.20 WWW (multiple) 2 10 5900 vnc Server 2.07 1.93 9 Japan 2.00 3.13 Microsoft 7212 GhostSurf 1.93 0.74 6 10 brazil 1.68 2.64 SQL Server 4 25 Smtp 1.89 2.28 – other 28.38 – Microsoft-RPC various other 22.56 – NetBIOS Figure 1: Attack Traffic, Top Originating Countries SSH Figure 2: Attack Traffic, Top Target Ports 4 5 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved
  • 5. Section 2: Security (continued) After previous issues of Akamai’s State of the Internet For the first time in 2008, Port 80 (WWW) moved into second place in the top 10. SQL injection attacks cont- report were published, it was suggested that attack traffic inued to be a popular attack vector in the fourth quarter, patterns may have a correlation with Microsoft’s “Patch as noted in Section 2.5. The significant growth in obser- Tuesday” updates — a so-called “Attack Wednesday” ved attack traffic to this port may be due to scans looking following the Tuesday release of patches by Microsoft, as for Web servers that are vulnerable to such attacks. attackers looked for unpatched systems in order to exploit Interestingly, Port 80 was responsible for over 93% of the those specific vulnerabilities. However, looking at obser- attacks that were observed to be originating in Sweden. ved attack traffic from the fourth quarter, aggregated by day of week, it does not appear that this suggested Attacks targeted at Port 8000 also grew significantly in correlation necessarily holds, as is shown in Figure 3. the fourth quarter, enough to push it into the top 10 list. Officially,5 Port 8000 is used for the “iRDMI” service, In fact, it appears that Wednesdays accounted for the Figure 4: Attack Traffic, by Day of Quarter though it is unclear what this service is, or what it is lowest percentage of weekday traffic during the fourth used for. However, the port is also6 reportedly used by quarter, though still ahead of the percentage of attacks a number of other software packages, and is also often that was observed on Saturdays and Sundays. update9 issued by Microsoft that addressed a critical day11 by Microsoft, warning that systems running various used as an alternative default port for HTTP traffic. It is vulnerability in some versions of their Internet Explorer older versions of SQL Server were vulnerable to attack, not known which piece of software that binds to Port However, looking at attack traffic by day across the Web browser, and the near-doubling of attack traffic and the traffic seen that day has a high likelihood of 8000 was targeted by these attacks. quarter, a significant increase occurred on November 19, seen on that day may be related to that vulnerability. In being attempted SQL injection attacks. and attack traffic remained elevated throughout the rest addition, the massive spike that was seen on December Port 7212 also made its first appearance in the top 10 of the quarter, as shown in Figure 4. 5 followed the posting of an “Advanced Notification”10 Comparing the levels of attack traffic targeted at the during the fourth quarter. During the third quarter, this by Microsoft of the security bulletins that were going to top three Microsoft-related ports (445, 139, and 135) port was the top target port for attacks seen from China It is interesting to note that November 19 is, in fact, a be released the following Tuesday. Again, this increase in aggregated across the fourth quarter, and charting the — in the fourth quarter, it was the third most targeted Wednesday, but did not follow a “Patch Tuesday” attack traffic may have been related to attackers rushing levels by day of week, they all appear to follow a similar port for China-sourced attacks. Please refer to Akamai’s release — Microsoft Security Bulletins MS08-0687 and to exploit the related vulnerabilities ahead of patches pattern. The number of attacks reaches the highest levels 3rd Quarter, 2008 State of the Internet report for MS08-0698 were released a week prior. However, the being issued. Finally, the spike seen on December 22 can early in the week, bottoming out on Thursday, and then additional details on Port 7212 vulnerabilities. peak seen on December 18 did follow an out-of-band likely be correlated with a security advisory issued that increasing again into the weekend, as shown in Figure 5. 2.3 Attack Traffic, By Day 135 139 445 Sunday Monday Tuesday Wednesday Thursday Friday Saturday Figure 3: Attack Traffic, Aggregated by Day of Week Figure 5: Attack Traffic Targeting Ports 445, 139, and 135 by Day of the Week 6 7 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved
  • 6. Section 2: Security (continued) 2.6 TCP-Based Attacks This traffic pattern may also be influenced by Microsoft’s Georgia.14 The Wordpress.com blog platform (hosting SQL injection once again continued to be a popular practice of releasing major patches on Tuesday — more than 4.5 million blogs) was subjected to a DDoS vector for Web-based attacks during the fourth quarter. As noted above in Section 2.2, the Conficker worm vulnerabilities are exploited ahead of the patch releases, attack on October 27 that caused some of its blogs to Two Adobe Web sites, Vlog It and Serious Magic, were exploits services running on TCP port 445, and was iden- and then as compromised systems are patched, attack become unavailable for a period of time. Wordpress.com compromised through SQL injection in October, accord- tified as a key component in a botnet that was estimated volume decreases. has three origin data centers and was able to reroute ing to Internet security firm Sophos.20 In November, to include approximately half a million compromised the relevant traffic to unaffected servers once the DDoS security firm Kaspersky Lab discovered 1,200 Web sites systems by early December.30 The Conficker worm will 2.4 Distributed Denial of Service attack had been identified and isolated.15 around the world that had been compromised by an SQL be covered in more detail in Akamai’s 1st Quarter, 2009 (DDoS) Attacks injection attack that appeared to originate from China.21 State of the Internet report. The Internet celebrated an auspicious occasion on In late December, Microsoft issued a warning22 about a 2.5 Web Site Hacks & Web-Based Exploits 2.7 McColo Shutdown November 2, 2008, the 20th anniversary of the “Morris critical bug in its SQL server software that could be In December, the Koobface virus resurfaced on Facebook. Worm”, arguably the first major denial of service attack exploited by attackers. In mid-November, hosting provider McColo Corp. was The virus leverages malware unknowingly downloaded by on the Internet. According to a published report,12 the disconnected from the Internet. Identified as a major host users, which sends out messages to their Facebook friends, As initially described in the 3rd Quarter, 2008 State of worm was written by then Cornell University student of organizations engaged in sending unsolicited e-mail urging them to click on a link that takes them to an infec- the Internet report, the Web-based attack vector known Robert Tappan Morris, who was later convicted of com- (“spamming”), it was reported that McColo had been ted Web site,16 as well as hijacking search requests made puter fraud for the incident. Morris is now an associate as “clickjacking” gained additional exposure during the responsible for up to 75% of all spam sent each day.31 to popular search sites such as Google, Yahoo, and MSN. professor of computer science at MIT. Launched on fourth quarter. In early October, an Israeli research November 2, 1988, the Morris worm disabled approxi- released a proof-of-concept demo that highlighted the In addition to reducing spam volumes across the Internet, As discussed in the previous two issues of the State of the mately 10% of all Internet-connected systems. The worm threat posed the clickjacking flaw.23 Days later, Adobe the disconnection of McColo also served to disrupt the Internet report, cross-site scripting (XSS) continues to be was a self-replicating program that exploited known posted24 a workaround procedure to help mitigate “Rustock” and “Srizbi” botnets, crippling an estimated a problem. In October, Yahoo fixed an XSS error in the weaknesses in common utilities including e-mail software exposure, and subsequently released a Flash Player 500,000 compromised systems (“bots”).32 Although hotjobs.yahoo.com domain that allowed attackers to in- sendmail, as well as Finger, a tool that showed which update25 that addressed the security vulnerabilities. the Srizbi botnet control servers resurfaced at an ISP in ject JavaScript code into the page that silently copied the users were logged on to a given computer. Estonia, that ISP quickly cut off connectivity to those cookies used to authenticate Yahoo users when they log In October, a researcher at Aladdin Knowledge Systems servers.33 Unfortunately, the Srizbi bots gradually in to sections of the site that require a password. Attack- Several high-profile Web sites suffered DDoS attacks announced that that he had discovered a cache of user- became active again through updates to their code, and ers, using these cookies, then had broad control over the during the fourth quarter. The BBC Web site was subjec- names and passwords for over 200,000 Web sites, it appeared that several weeks after the McColo shut- victim’s Yahoo account, including Yahoo e-mail and any ted to a DDoS attack on November 6 that crippled the including 80,000 that had been modified with malicious down that spam volumes were once again on the rise.34 other service that uses authentication cookies belonging Web site’s performance significantly. During the attack, content.26 According to the researcher, the 200,000 to the yahoo.com domain.17 In December, it was discovered the BBC Web site responded very slowly, and measure- compromised sites included those belonging to govern- that an XSS error on americanexpress.com allowed attack- ments made by monitoring service Pingdom showed that ments, Fortune 500 companies, universities and other ers to steal users’ authentication cookies, which are used for a total of 1 hour and 15 minutes it did not respond businesses; more than half of the affected sites belonged to validate American Express customers after they enter at all.13 The Web site for “NO on Prop 8” (opposing to European companies and organizations. Other Web their login credentials.18 However, the security hole was Proposition 8, which would eliminate same-sex couples’ sites hacked in the fourth quarter included those belong- closed within an hour after an article about it was posted right to marry in California) was hit by a DDoS attack ing to online bill payment company CheckFree,27 the on IT news Web site The Register. Four XSS bugs on the that took the site down for several hours on October 29, Ohio Secretary of State,28 and the World Bank.29 Facebook Web site were also publicized and quickly with attack traffic originating from computers not just addressed in December.19 within California, but also from Texas, New Jersey and 8 9 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved
  • 7. Section 3: Networks and Web Sites: Section 2: Security (continued) Issues & Improvements 2.8 SSL Vulnerability 2.9 DNSSEC an alternate submarine cable through Puerto Rico.43 The fourth quarter of 2008 saw another significant On December 8, over a million subscribers of Time network outage in the Mediterranean, as a result of three On December 30, it was announced at the 25th Chaos Following the DNS exploit described by Dan Kaminsky Warner Cable saw their Internet connectivity impaired undersea cables being severed. A peering dispute between Communication Congress that researchers had found a in the third quarter, and the subsequent push for the for approximately two-and-a-half hours due to the Sprint-Nextel and Cogent Communications effectively way to target a known weakness in the MD5 algorithm implementation of DNSSEC, the Internet Corporation for failure of Time Warner’s DNS servers.44 partitioned the Internet, preventing single-homed custo- to create a rogue Certification Authority (CA) that would Assigned Names and Numbers (ICANN),38 VeriSign,39 and mers of both providers from reaching one another. In allow them to create “fake” SSL certificates that would the United States Department of Commerce National Eerily echoing events of January 2008, on the morning addition, a number of high profile Web sites experienced still be fully trusted by all modern Web browsers.35 As of Telecommunications and Information Administration of December 19, three key underwater cables in the availability problems throughout the quarter due to a the time of the announcement, at least six CAs were (NTIA)40 all issued proposals regarding the cryptographic Mediterranean (SeaMeWe-3, SeaMeWe-4 and FLAG) variety of reasons, including power outages and flash using the MD5 algorithm to sign SSL certificates, and the signature of the DNS root zone. NTIA invited interested were severed, which impacted Internet traffic in the crowds. Many new WiMAX initiatives were announced, researchers estimated that 30-35% of all SSL certificates stakeholders to file comments on the proposals, and Middle East and the Indian subcontinent.45 According which are likely to bring wireless broadband connectivity currently in use had an MD5 signature somewhere in received more than 30 comments in favor of securing the to measurements from Renesys, more than 1,400 of to users in countries around the world, and new fiber-to- their authentication chain.36 root zone. Commenters included representatives of the Egypt’s and more than 450 of India’s globally routed the-home initiatives and DOCSIS 3.0 rollouts brought Internet Architecture Board, the Internet Society, Akamai prefixes (networks) suffered outages, as shown in Figure extremely high-speed wired broadband connectivity to Because the digital signature on the fake certificate Technologies, NeuStar, Afilias, and Comcast.41 6. Repairs to the SeaMeWe-3 and SeaMeWe-4 cables users in North and South America, Asia, and Europe. appears to come from a reputable and presumably trust- began two days later, as the repair ship “Raymond worthy CA, a user’s browser will accept it and indicate to In the meantime, seven leading domain name vendors, 3.1 Network Outages Croze” was dispatched by France Telecom.46 Unfortu- the user that the connection is secure. Coupled with the representing more than 112 million domain names nately, as France Telecom finished repairing the On December 4, equipment failure caused a complete DNS attack described by Dan Kaminsky, users could be (65% of all registered domain names) formed the SeaMeWe-4 cable on December 25, the cable broke loss of Internet connectivity for two of the three ISPs in redirected to malicious sites without being aware of it. DNSSEC Industry Coalition to work together to drive the again in a different place, which pushed out repairs until Haiti that connect to the Internet through the ARCOS These rogue e-commerce or banking sites, for example, adoption of DNSSEC across all domain name registries approximately 10 days later than originally expected.47 submarine cable. The outage lasted for approximately would appear trusted, and could make the collection of and registrars around the world.42 Participants in the three-and-a-half hours until traffic was re-routed through login or other personal data fairly simple for an attacker coalition include VeriSign (.com, .net), The Public Interest without raising a user’s suspicion. Registry (.org), Nominet UK (.uk), Afilias (.info), NeuStar (.biz, .us), the Foundation for Internet Infrastructure (.se), Two days after the announcement, VeriSign announced and Educause (.edu). While the primary goal of the that they would be transitioning from the MD5 algorithm coalition is to accelerate the deployment of DNSSEC, to the SHA-1 algorithm for digital certificates they issued, the participants noted that it would be “unrealistic” to and security researchers encouraged other CAs to do set forth a timetable for deployment until the issues the same.37 surrounding signature of the DNS root zone are resolved. Figure 6: Network Outages by Country (Data courtesy of Renesys) 10 11 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved
  • 8. Section 3: Networks and Web Sites: Issues & Improvements (cont’d) 3.2 Routing Issues 3.3 Peering Issues 3.4 Web Site Outages A Reuters article48 noted that the three severed cables were the most direct route for moving traffic between On November 10, Companhia de Telecomunicacoes do On October 30, the network link between Cogent and The Web site of file sharing service Yousendit was Western Europe and the Middle East, and that Verizon Brasil Central (CTBC) inadvertently leaked a nearly-full Sprint-Nextel disappeared; from a routing perspective — unavailable for over 5 hours in total, due to four separate had rerouted some of its traffic by sending it across set of routing information to two of its upstream network Sprint de-peered Cogent. As a result, customers of outages that occurred on November 17. The shortest the Atlantic, then the United States, across the Pacific, providers, in essence hijacking most of the Internet’s Cogent lost access to networks connected to Sprint, and outage lasted 30 minutes and the longest lasted 2 hours and on to the Middle East. It is important to note that address space. The data was not generally propagated vice-versa.50 Cogent is no stranger to peering disputes, and 25 minutes.56 XCalibre Communications’ FlexiScale Akamai’s services can help customers maintain consistent to the Internet at large, though, preventing another and had been involved in at least four prior incidents over on-demand utility computing platform experienced site and application performance and availability when YouTube-like issue that occurred earlier in the year. (See the last six years — AOL in 2003, France Telecom in another big outage in late October. The outage lasted such cable cuts occur, and when alternate routes force Section 3.3 of Akamai’s 1st Quarter, 2008 State of the 2006, Level 3 in 2005 and TeliaSonera in March 2008.51 approximately 18 hours and was reportedly due to near- traffic across continents and oceans. Figure 7 illustrates Internet report for additional details on the YouTube A related post52 on the Renesys blog noted that 289 simultaneous failures in the switches that connect the the results of a performance test for a customer portal issue.) Ultimately, the leak had no significant global impact. autonomous systems (networks) are completely single- storage to the processing nodes.57 Google’s Gmail service hosted in Europe, as seen by Akamai’s AsiaPac measure- However, it did make its way to RIPE’s route collector in homed (have no connectivity to the Internet through continued to have problems in the fourth quarter, ment agents. As shown, the measurement agents saw a Sao Paolo, Brazil, where a volunteer-based route monitor- anyone else) behind Cogent, and that 214 are completely experiencing an outage starting on October 15 that significant degradation in performance when trying to ing project noticed the leaked announcement and single-homed behind Sprint. In addition, Renesys noted, lasted approximately 30 hours.58 Some additional avail- retrieve content from the origin during the two days notified subscribers via e-mail of the hijacking.49 While due to Cogent’s aggressive pricing, there are a large ability issues impacting Gmail reportedly also occurred before repairs began. However, portal performance as there was little impact to the Internet as a whole, the number of service providers that are multi-homed but on Monday, October 20.59 delivered by Akamai’s IP Application Accelerator service event served to underscore the challenges that surround that send all of their outbound traffic through Cogent by remained consistent throughout the duration of the monitoring for, and alerting on, significant route changes. default. Consequently, this de-peering prevented traffic Problems dealing with “flash crowd” traffic also caused cable cut, as Akamai is able to identify and send traffic originating from those users from reaching Sprint- outages at a number of Web sites during the fourth over alternative network paths on a real-time basis. connected users. Unsurprisingly, Sprint PCS was one of quarter. The Openoffice.org site crashed on October 14, the networks single-homed to Sprint’s network, meaning due to overwhelming demand for its new 3.0 software that users of mobile devices using Sprint’s cell phone release.60 The Europeana digital library enjoyed a high- services may have had problems connecting to Web sites profile launch on November 20, but the system was and online services connected to Cogent. swamped by an unexpected 10 million user requests per hour and crashed within 24 hours of its launch.61 The Published reports53 indicated that the peering dispute Web site for Dr. Pepper was unavailable for large parts was sourced in a disagreement over payments that Sprint of the day on November 23, as the result of a surge of claimed it was owed for ongoing traffic exchange after a traffic related to a one-day marketing promotion that peering trial that ended in September 2007 — Cogent’s promised everyone in America a free bottle of soda if executives believed that the results of the trial had the new Guns n’ Roses album was released during 2008. qualified them for settlement-free peering. However, Dr. Pepper ultimately elected to extend the offer an extra on November 2, Sprint re-enabled the connection with day and add more server capacity to handle the load.62 Cogent,54 and on December 22, Sprint and Cogent Web sites can leverage the on-demand capacity available Figure 7: Akamai Download Performance Remained Consistent Despite Cable Cut announced that they had reached a multi-year intercon- through Akamai’s site delivery services to help them nection agreement for the purposes of exchanging avoid traffic-related site downtime or the need to add Internet traffic.55 additional server capacity. 12 13 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved
  • 9. Section 3: Networks and Web Sites: Issues & Improvements (cont’d) 3.5 Significant New Connectivity — High traffic levels and application problems combined to able for nearly three hours on November 18 while it end-to-end connection — if a link is lost, the Undersea Cables take various U.S. Postal Service Web-based services migrated to a new server facility.71 A “catastrophic” communication node will store the information until offline the week of December 8. Several different online UPS failure caused a power outage on November 13 at A report published in December by telecommunications the connection is re-established. tools, including the Postal Service’s popular Click-N-Ship a Santa Clara data center operated by Quality Technology research firm Telegeography noted74 that rapid growth in service, suffered outages.63 Most tools were available Services, triggering days of performance problems for Internet capacity around the world over the last decade Closer to Earth, O3b Networks continues to sign contracts again by Monday afternoon, but the Click-N-Ship service the social network Friendster. Although the hosting has led to a diminished role for the United States as an to bring Internet connectivity to remote regions using was not fully functional again until Friday, December 12.64 facility was back on generator power within two hours, Internet hub, with dramatic shifts in the amount of traffic satellites in equatorial orbit. In December 2008, O3b Friendster remained offline for more than 23 hours over that passes through the United States from other conti- announced that Afghani telco Neda Telecommunications A number of social networking and related sites a three day period.72 nents. Telegeography found that in 1999, 91% of data will deploy its Quick Start service as a means for connect- experienced varying amounts of downtime in the fourth from Asia passed through the United States at some ing to the Internet, though service activation is not quarter. The blog search engine Technorati experienced Looking back across all of 2008, Pingdom published73 point on its journey, but by 2008, that had fallen to just expected until late 2010.77 In Libya, users working or both downtime and slower performance for more than a report entitled “Social Network Downtime in 2008,” 54%. In 1999, 70% of data from Africa passed through located in remote areas now have access to satellite- nine hours on December 12 and 13.65 Dating website which analyzed the Web site availability (uptime) of 15 the United States, but by 2008, that number decreased based connectivity through portable satellite broadband Match.com experienced technical difficulties and was of the world’s largest social networks. Pingdom noted to just 6%. One key reason for this decline has been terminals, with speeds up to 444 Kbps.78 Finally, in Dec- unavailable for more than an hour and a half on October that Facebook and MySpace, the two largest social the growth in inter-regional connectivity made possible ember, California-based Viasat announced a plan to put 29.66 Business networking site LinkedIn was down for networks monitored, both had very little downtime in by numerous submarine cable projects, including those a broadband Internet satellite into orbit above the U.S. over an hour on October 10,67 and experienced an 2008. Only four social networks that were monitored for covered in previous editions of Akamai’s quarterly in the first half of 2011.79 According to Viasat, the sat- additional hour-long outage on November 16.68 Hosted the full year achieved overall uptime of 99.9% or better: State of the Internet reports. ellite will have an overall throughput of 100 Gbps, which blogging service Typepad was down for an hour on Facebook (99.92%), MySpace (99.94%), Classmates.com it claims should enable it to support 2 Mbps service to October 3,69 and micro-blogging service Twitter exper- (99.95%), and Xanga (99.95%). Figure 8 illustrates the In the Middle East, the Cyprus Telecommunications approximately 2 million subscribers when operational. ienced a brief outage on November 13, lasting just under aggregate downtime (in hours) that Pingdom observed Authority (Cyta) and the Syrian Telecommunication Viasat’s plans parallel an effort by Eutelsat in Europe an hour, due to a DNS configuration error.70 Popular for the social networks that it was monitoring. Establishment (STE) have agreed75 to upgrade the to launch a high capacity broadband satellite in 2010. blogging/social networking site LiveJournal was unavail- UGARIT submarine cable link between Tartous in Syria and Pentaskhinos in Cyprus in order to increase Internet Akamai’s 3rd Quarter, 2008 State of the Internet report capacity between the two countries. The 239km UGARIT noted that Sprint-Nextel had launched the “Xohm”- cable began operations in 1995, and its transmission branded WiMAX service in Baltimore, Maryland. During capacity is limited to 622 Mbps, which is also driving the the fourth quarter, Sprint-Nextel completed the two companies to initiate feasibility studies for establish- formation of a WiMAX joint venture with Clearwire, ing a second submarine link between their countries. and re-branded the service as “Clear”.80 The first city expected to get the new “Clear” WiMAX service is 3.6 Significant New Connectivity — Wireless Portland, Oregon in early January 2009.81 Representing possibly the extreme in “wireless” Internet connections, in November 2008, NASA reported the first Internationally, announcements of new WiMAX networks successful tests of its Deep Space Network, which is surged in the fourth quarter of 2008. During the quarter, modeled after the Earth-bound Internet.76 The Deep Telegeography’s CommsUpdate daily briefings82 highlight- Space Network relies upon Disruption-Tolerant ed announcements of new or expanded WiMAX networks Figure 8: Social Network Downtime in 2008, in hours (Data courtesy of Pingdom) Networking (DTN) that does not assume a continuous in Australia,83 Bahrain,84 Barbados,85 Bermuda,86 Brazil,87 14 15 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved
  • 10. Section 3: Networks and Web Sites: Issues & Improvements (cont’d) Cameroon,88 Iraq,89 Italy,90 Jordan,91 Kenya,92,93 Malaysia,94 Foundation whitepaper116 published in November. the government called on telecommunications However, by the end of the comment period in mid- Montenegro,95 Netherlands,96 Pakistan,97 Romania,98 According to the paper, the idea is that “Consumers may providers119 to offer broadband services across all its December, the United States Department of Commerce, territory for a maximum of €35 ($45.15) a month. This South Africa,99 Spain,100 and Sri Lanka.101 one day purchase and own fiber connections that run the Australian government, members of the global bus- from their homes. They would then be able to connect makes France the first country in the European Union iness community, and over 200 commenters on the posted Telegeography also highlighted the launch of 3G-based to a variety of service providers, including today’s to effectively mandate the supply of broadband services. proposal expressed significant opposition to ICANN’s plan, mobile broadband services in Canada,102 Japan,103 the Internet, television, and telephone services, as well as France Telecom and SFR plan to include broadband urging them to “go back to the drawing board and United Kingdom,104 and Uzbekistan.105 ultra-bandwidth intensive services of the future.” The among their universal services by the end of 2009. propose a process that results in a responsible expansion paper’s authors also propose that the fiber would form of the name space, not merely a duplication of it.” 124 3.7 Significant New Connectivity — part of the property right in the home. However, they In the United States, an economic stimulus bill signed in Fixed Broadband 3.9 IPv6 note that no market for consumer purchase of fiber February 2009 reportedly provides $7.2 billion devoted The launch of DOCSIS 3.0 is enabling cable providers currently exists, but they are looking at one trial that is to broadband funding, aimed at creating incentives for According to published reports, the adoption of IPv6 to roll out higher-speed connectivity options to their already ongoing in Ottawa, Canada as a means to test additional infrastructure buildout and the development continued a slow, steady growth into the end of 2008. customers, with Comcast106 announcing availability of their model’s feasibility and identify associated challenges of a comprehensive national broadband plan by the A blog post125 at Internet infrastructure news & opinion service tiers up to 50 Mbps in multiple cities across the and insights. FCC.120 This “broadband stimulus” will be examined in site CircleID notes that at the end of the year, 4% of more detail in Akamai’s 1st Quarter, 2009 State of the United States; Virgin Media107 in the United Kingdom autonomous systems on the Internet supported IPv6, Internet report. launching a 50 Mbps service; and UPC Netherlands108 Also in Canada, the Saskatchewan government up from 2.4% at the beginning of 2008. In addition, offering access at speeds of 60-120 Mbps. announced in late November that they aim to have the Number Resource Organization (NRO), which is made 3.8 DNS Expansion 100% broadband coverage across the Canadian territory up of the five Regional Internet Registries (RIRs), announ- According to the Domain Name Industry Brief report A number of announcements were also made regarding within three years under a new CAD $129 million ced126 in early December that the rate of new entrants fiber-to-the-home (FTTH) initiatives in several countries. infrastructure rollout plan. Regional incumbent telecom published121 by VeriSign, 2008 ended with a total of into the IPv6 routing system has increased by approx- In Switzerland, Swisscom began to connect households SaskTel’s fixed broadband network footprint will be 177 million domain name registrations across all of the imately 300 percent over the past two years. Additional to the neighborhood fiber-optic nodes they had pre- expanded to cover 100% of the population, up from Top Level Domains (TLDs), representing 16% growth IPv6 statistics presented at the RIPE 57 meeting in viously deployed.109 In an interesting move, Swisscom will 86% coverage today, through an expansion of the over the previous year and 2% growth over the third October were highlighted in another127 CircleID blog be laying several fibers per household to enable invited existing CommunityNet high speed network, upgraded quarter of 2008. More than 10.1 million new domain post, including data on IPv6 traffic by country, OS partners in the telecommunications, cable, and utilities rural backbone infrastructure, and a partnership with a names were registered across all of the TLDs in the fourth support, access methods, and IPv6-related latency. industries to expand their own fiber-optic infrastructure. satellite firm in order to provide access to the most quarter of 2008, reflecting slower growth in new regis- One fiber will be used by Swisscom, while the others will remote areas.117 trations, with a decline of 12% from the third quarter. However, research presented at the Proceedings of the be made available to the potential partners. In November, ACM Internet Measurement Conference, based on what As highlighted in the 2nd Quarter, 2008 State of the Netherlands telco KPN and FTTH operator Reggefiber Similarly, in November, Finland’s government said118 that the researchers claim is “the first complete census of the it will invest up to €66 million ($85.2 million) as part of Internet report, in October, ICANN published a draft said that they are planning to roll out a FTTH network Internet in more than two decades”, discovered a surpri- that could cost as much as 7 billion euros that is planned plans to increase high speed broadband coverage across “Applicant Guidebook” for new generic TLDs, and posted sing number of unused IPv4 addresses and concluded to cover pretty much every part of the Netherlands.110 the country. The investment is part of an effort to it online for review and comment.122 According that many will still be unused in two years when IPv4 Additional FTTH service announcements were made by increase access to 100 Mbps connectivity in Finland to to published reports,123 ICANN would charge groups address space was projected to be exhausted.128 “There Brasil Telecom (Brazil),111 MTNL (India),112 Telefonica 100% of the population by 2016. The expectation is that $185,000 to apply for a generic TLD, with most of the are huge chunks of IP space which are not allocated yet, (Spain),113 Telecom Italia (Italy),114 and TTK (Russia).115 by 2015, approximately 95% of the population will have money going toward evaluation of the application. and also giant swaths which are inefficiently allocated,” access to the higher broadband speeds through commer- ICANN’s plan would open up TLDs to non-English the researchers noted. Also in the fourth quarter, the notion of “homes with cial development, and by 2010 all broadband users are character sets, and seeks to streamline a TLD-creation tails” began to take root, popularized in a New America expected to be able to receive at least 1 Mbps. In France, process that has proven cumbersome in the past. 16 17 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved