Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

China Internet 'hijack' hugely exaggerated, says researcher

Diverted traffic nowhere near claimed 15 percent

Article comments

The claimed ‘hijack’ of Internet traffic by China Telecom has been hugely exaggerated in scale and intent, a traffic analysis by Internet security company Arbor Networks has concluded.

A blog by Arbor chief scientist Craig Labovitz picks apart the speculative claim, attributed to McAfee’s VP of threat research, Dmitri Alperovitch (subsequently clarified here), that the unusual routing diversion through China Telecom at 4am GMT on 8 April 2010 could have amounted to as much as 15 percent of Internet traffic.

According to Labovitz, this appears to have been calculated by comparing the 40,000 affected BGP routes to the 340,000 in the routing table as a whole, a calculation originally cited by the industry BGPmon website.

Using numbers culled from the Arbor Atlas traffic monitoring system of 80 global ISPs, however, traffic on that day barely increased beyond normal patterns at most it amounted to only a few gigabits per second out of an Internet total between 80 and 100 terabits per second.  

A redirection of a major portion of Internet traffic would have been expected to have either boosted or surpressed traffic volumes, depending on the scale of increase in traffic to China Telecom or the decrease in volume to other ISPs. Neither appeared to happen on any scale.

It’s a crude calculation but it does pour more cold water in the headline-grabbing suggestion that China Telecom suddenly routed 15 percent of the entire Internet and all that entails in the minds of Congressional report writers.

“We need to fix Internet infrastructure security, but we also need to be precise in our analysis of the problems,” comments Labovitz.

A BGPmon note at the time of the April ‘hijack’ played down the likelihood that the 8 April event was anything other than “fat fingers” on the part of a China Telecom engineer, whilst expressing concern that it happened at all.

“Given the large number of prefixes and short interval I don’t believe this is an intentional hijack,” said the BGPmon researcher in an analysis.

Scale, of course, is not the only consideration when looking at interference with the Internet’s routing infrastructure. Labovitz’s colleague Danny McPherson, company CSO, was cited by the Congressional report as speculating that if the event was deliberate it could have been a way to obscure a targeted attack or probe. As ever, even informed experts disagree on where emphasis should be placed.


More from Techworld

More relevant IT news


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *