Feeds

Windows worms tax ISPs

European ISPs hit for €123m in 2004

  • alert
  • submit to reddit

HP ProLiant Gen8: Integrated lifecycle automation

Computer worms will cost European ISPs an estimated €123m this year, according to a study by Sandvine. The Net traffic management firm says its study shows attacks on European service providers are now a daily occurrence.

Although worms are usually associated with attacks on corporate networks, the malicious traffic also ties up service provider networks, degrading the broadband experience for home Internet users. Meanwhile, outbreaks of computer worms generate a huge upsurge in support calls to ISPs. On any given day, between five and 12 per cent of all Internet traffic moving across European ISP networks is malicious, according to Sandvine.

Counting the costs

Working from metrics derived from its European customers and other industry research, Sandvine reckons that worm attacks will cost the European service provider sector more than €123m in 2004 and €159m in 2005. The problem will cause UK ISPs €22.4m this year. French ISPs will haemorrhage €17.9m and German ISPs €22.7m for the same reason, according to Sandvine.

These estimates cover the cost of specialised tactical response teams, swamping of customer support resources, inflated transit costs and perhaps most damaging over the long term, a loss of brand equity that aggravates the industry-wide problem of customer churn. Estimating the financial cost of computer worms is a notoriously inexact science but Sandvine's argument - that broadband firms are suffering financially because of computer worms - remains sound.

"The quickening pace of worm attacks makes understanding their impact on service providers increasingly urgent," said Tom Donnelly, co-founder and marketing veep at Sandvine. "Worms exact a massive toll by forcing service providers to mobilise premium resources in order to quell attacks and protect the subscriber experience."

Sandvine researchers have also uncovered another type of expensive worm activity: persistent, low-level attack traffic caused by remnants of previous worms which cling-on tenanciously to residential subscriber PCs. Cumulatively, worms of both magnitudes are now an operational preoccupation for network managers and a worrisome drag on ISP profit margins, Sandvine says.

Windows security tax

Linux worms are not unknown (lion for example) but the vast majority of Worms exploit vulnerable Microsoft systems to spread: Code Red, Nimda, Blaster, Sasser - the list goes on. The pain experienced by telcos was a driving factor behind Microsoft's release of tool to purge systems infected by Blaster. Defending systems against Blaster-style attacks has created a new segment in the security market which host-based intrusion prevention firms (Cisco, PrevX, SecureWave), firewall vendors (Check Point etc.) and filtering firms (Scan Safe etc.) are all eager to tap into. There's a gradual realisation that the AV scanner approach by itself doesn't defend against Nimda-style attacks.

This month analyst firm Gartner advised its customers to budget for extra security spending on Windows desktops (like better patch management and intrusion prevention) in the wake of the problems caused by the Sasser worm. So computer worms have become an extra tax burden on both end users and ISPs. Unless Microsoft lifts this burden through addressing the root causes - vulnerabilities in Windows - it risks making alternatives look increasingly attractive. ®

Related stories

Attack of the Profit-Killer Worms
P2P swamps broadband networks
Sasser ups cost of Windows - Gartner
Sasser creates European pandemonium
Blaster body count '8m or above' - MS
Blaster beats up British business
Blaster rewrites Windows worm rules

Related links

Worms gobbling ISP profits: The financial impact of attack traffic on European service provider networks, Sandvine white paper.

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.