Welcome!

Related Topics: Cloud Security, Java IoT, Microservices Expo, IoT User Interface, @CloudExpo, @BigDataExpo

Cloud Security: Article

Major Internet Outage in China

For whatever reason at around 3 pm (China time) 2/3 of any domain requests in China were routed to one single IP address

Yesterday one of the biggest outages in history, if not the biggest outage, happened to the Internet in China.

Primarily and directly affected by that outage were most of the people living in China and browsing the Internet in China. Secondary, all companies doing online business in China were affected.

The reasons for the outage are discussed below but I would like to focus on what has happened and what this means for all of us - including Compuware - with our Web presence in China.

For whatever reason at around 3 pm (China time) 2/3 of any domain requests in China were routed to one single IP address.

That single datacenter of course went down immediately by the loads of requests hammering it within milliseconds. At that very moment the Internet in China went down - with a few exceptions (VPN users and those who had the DNS cached within their client).

The outage lasted for north of 8 hours, during the core business time in China.

Interestingly enough, not all domains were affected. Mainly those ending with .com and .net didn't make it. Others with the ending com.cn were "only" partly offline but still had problems. Adobe was technically not reachable. Nokia.com was available in parts of China but part of its content was directed to the suspect IP.

If one domain was reachable because the users browser still had the domain/IP relation in mind other issues appeared.

I mentioned Nokia.com just a second ago. Nokia.com itself was available but the page was kind of broken and loading very slow. The reason was the domain r.nokia.com was falsely directed to the one and only IP everything got directed to.

Figure 1: HTML of Nokia.com was loaded but no css and js. That made the page unusable.

You can see how everything got routed to the one IP address - six connections by only one single host name. Imagine how many requests hammered on that server when you know there are hundreds of millions of Chinese users opening a webpage that has 21 different host names included (average number of hosts included in a webpage - source HTTParchive.com). This incident can be considered the biggest DDoS attack in history.

Now with that said - what else has been damaged?

Read the entire blog post here for a deeper analysis and more details regarding the scope and impact of this major "Internet earthquake.".

Summary
Nearly every Chinese Internet user was affected by the outage. Nearly every company doing online business in China was affected by this outage. Click here to view more analysis.

It is interesting how sensitive the Internet is, reacting to a tiny DNS accident, how long it took to recover - and most important - how quiet everything was outside of China. The web was nearly not available to one of the strongest and fastest-growing economies for one business day.

More Stories By Heiko Specht

Heiko Specht is a technology expert at the Compuware APM Center of Excellence. His focus is on APM as a Service in the EMEA markets. Heiko has experience in all areas of Web Performance and Application Monitoring and special expertise in APIs, data interpretion, agile developement, webservices, XML, XSL, php, asp, XHTML, CSS, Enterprise infrastructure, Server architecture, Server sizing, interface description, flexible, performance management, monitoring key business processes and business impact analysis.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Latest Stories
What are the successful IoT innovations from emerging markets? What are the unique challenges and opportunities from these markets? How did the constraints in connectivity among others lead to groundbreaking insights? In her session at @ThingsExpo, Carmen Feliciano, a Principal at AMDG, will answer all these questions and share how you can apply IoT best practices and frameworks from the emerging markets to your own business.
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Cloud analytics is dramatically altering business intelligence. Some businesses will capitalize on these promising new technologies and gain key insights that’ll help them gain competitive advantage. And others won’t. Whether you’re a business leader, an IT manager, or an analyst, we want to help you and the people you need to influence with a free copy of “Cloud Analytics for Dummies,” the essential guide to this explosive new space for business intelligence.
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, outlined ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and sto...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.