Feeds

Key internet address server sees spike in traffic

K-root down, but not (yet) out

Security for virtualized datacentres

Traffic hitting a key internet address look-up server in Europe has spiked over the past 24 hours, reaching loads that are four times higher than normal.

It's still not clear what's causing the sharp increase in queries to the K-root, which is maintained by the RIPE Coordination Network Centre. Engineers with the Netherlands-based regional internet registry said they are analyzing the traffic and communicating with internet service providers to learn more about the source of the queries.

The RIPE advisory said the increased load also hit other root servers, which are the authoritative source for translating domain names into their computer-readable IP addresses. In all there are 13 servers, or clusters of servers, maintained by various organizations around the world. The spike hasn't had a dramatic effect on response times in the root zone.

"You will notice that only a few test clients were affected because not all anycast instances of K-root were subject to the increase in traffic," the RIPE engineers wrote. "Also not[e] that we successfully mitigated the effect of the increased load even further around 6:30 UTC."

Unanswered queries for each root

Unanswered queries for each root. Chart supplied by RIPE.

The engineers have shifted traffic from Amsterdam to London to gather data about its source. Figures supplied by RIPE showed that the B, C, E, and G roots -- operated by the the University of Southern California, Cogent Communications, NASA, and the Defense Information Systems Agency, respectively -- were dropping more queries than the K root was, although the cause wasn't explained.

"Not certain what is behind it other than an unusual amount of address queries for .com domains," Randal Vaughn, a professor of information systems at Baylor University, wrote in an email to The Register. "If I am reading the rolling graph on http://dns.icann.org/ [correctly] it seems the traffic may be decreasing." ®

Internet Security Threat Report 2014

More from The Register

next story
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Sea-Me-We 5 construction starts
New sub cable to go live 2016
EE coughs to BROKEN data usage metrics BLUNDER that short-changes customers
Carrier apologises for 'inflated' measurements cockup
Comcast: Help, help, FCC. Netflix and pals are EXTORTIONISTS
The others guys are being mean so therefore ... monopoly all good, yeah?
Surprise: if you work from home you need the Internet
Buffer-rage sends Aussies out to experience road rage
EE buys 58 Phones 4u stores for £2.5m after picking over carcass
Operator says it will safeguard 359 jobs, plans lick of paint
MOST iPhone strokers SPURN iOS 8: iOS 7 'un-updatening' in 5...4...
Guess they don't like our battery-draining update?
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.