Online attackers briefly disrupted service on at least two of the 13 "root" servers that are used to direct traffic on the internet yesterday.
The attack, which began 10.30am GMT, was the most significant against the root servers since an October 2002 distributed denial of service (DDOS) attack, said Ben Petro, senior vice president of services with internet service provider Neustar. Root servers manage the internet's Domain Name System (DNS), used to translate web addresses such as Amazon.com into the numerical Internet Protocol addresses used by machines.
The attack appeared to have been launched by a group of compromised PCs, called a botnet.
"Two of the root servers suffered badly, although they did not completely crash; some of the others also saw heavy traffic," said John Crain, chief technical officer with the Internet Corporation for Assigned Names and Numbers (ICANN).
The two hardest-hit servers are maintained by the US Department of Defense and ICANN, he added.
The botnet briefly overwhelmed these servers with useless requests, causing them to occasionally hang, but did not disrupt internet service, Petro said. By 3.30pm, internet service providers were able to filter enough of the traffic from the botnet machines that traffic to and from the root servers was essentially back to normal.
Compared to other DDOS attacks, this one did not have a lot of firepower. Petro said the bandwidth of the attack could be measured in megabytes, as opposed to the gigabyte-level attacks that are now frequently seen. "It was a small attack, but it was focused and targeted at the roots," he said.
It is unclear where the attack originated, Crain said. "The effect of this traffic on the end users was negligible," he added.
Petro said engineers are still "scratching their heads" about the reason for the attack. Although some DDOS attacks are launched for political reasons or to extort money from website owners, this one appeared to have no such purpose, he said.