SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
Volume 1, Number 4




4th Quarter, 2008


The State of
the Internet

                      PORT
                    RE
Executive Summary

                                                                                                                                     Each quarter, Akamai will be publishing a quarterly “State of the Internet” report. This report
                                                                                                                                     will include data gathered from across Akamai’s global server network about attack traffic
                                                                                                                                     and broadband adoption, as well as trends seen in this data over time. It will also aggregate
                                                                                                                                     publicly available news and information about notable events seen throughout the quarter,
                                                                                                                                     including Denial of Service attacks, Web site hacks, and network events, including outages
                                                                                                                                     and new connections.


                                                                                                                                     During the fourth quarter of 2008, Akamai observed attack traffic originating from 193
                                                                                                                                     unique countries around the world. The United States and China were the two largest attack
                                                                                                                                     traffic sources, accounting for over 42% of observed traffic in total. Akamai observed attack
                                                                                                                                     traffic targeted at more than 20,000 unique ports, with the top 10 ports seeing over 77% of
                                                                                                                                     the observed attack traffic. Web site hacks and Web-based exploits were regularly in the news
                                                                                                                                     during the quarter, as was a proof-of-concept exploit for a vulnerability in SSL, the underlying
                                                                                                                                     mechanism that secures financial and retail transactions, among others, across the Web.


                                                                                                                                     Notable network outages in the fourth quarter were due to submarine cables in the
                                                                                                                                     Mediterranean being severed, as well as two major Internet backbone providers de-peering
                                                                                                                                     their networks from one another. Notable Web site outages in the fourth quarter were
                                                                                                                                     attributed to increased traffic, hardware failure, and power outages.


                                                                                                                                     Global connectivity advanced in the fourth quarter, with the commercial launch or
                                                                                                                                     announcement of WiMAX and 3G broadband services in a number of countries, the launch
                                                                                                                                     of higher speed cable broadband services based on DOCSIS 3.0, and additional fiber-to-the-
                                                                                                                                     home services that will bring extremely high-speed connections to subscribers in Switzerland,
                                                                                                                                     Brazil, India, Spain, Italy, and Russia.


                                                                                                                                     Akamai observed a nearly six percent increase (from the third quarter 2008) globally in the
                                                                                                                                     number of unique IP addresses connecting to Akamai’s network, and a 28% increase from
                                                                                                                                     the end of 2007. From a global connection speed perspective, South Korea had the highest
                                                                                                                                     levels of “high broadband” (>5 Mbps) connectivity for the fourth consecutive quarter, and
                                                                                                                                     the highest average connection speed, at 15 Mbps. In the United States, Delaware also
                                                                                                                                     maintained its top position, with 62% of connections to Akamai occurring at 5 Mbps or
                                                                                                                                     greater, and the highest average connection speed in the United States, at 7.3 Mbps. Looking
                                                                                                                                     at observed “narrowband” (<256 Kbps) connections, Mayotte and Equatorial Guinea were
                                                                                                                                     the “slowest” countries, with 98% and 96% of connections to Akamai, respectively, occurring
                                                                                                                                     at speeds below 256 Kbps. In the United States, the District of Columbia continued to have
                                                                                                                                     the highest percentage of observed connections below 256 Kbps. However, this was down
                                                                                                                                     nearly seven percent from the prior quarter, and over 42% from the end of 2007.


The “spinning globe” featured in the Akamai NOCC represents where Akamai servers are located and how much traffic they are seeing.
Table of Contents                                                          Introduction
    1: IntroductIon                                                       3
    2: SecurIty                                                            4   Akamai’s globally distributed network of servers allows us to gather massive
    2.1 Attack Traffic, Top Originating Countries                          4   amounts of information on many metrics, including connection speeds, attack
    2.2 Attack Traffic, Top Target Ports                                   5   traffic, and network connectivity/availability/latency problems, as well as user
    2.3 Attack Traffic, By Day                                             6   behavior and traffic patterns on leading Web sites.
    2.4 Distributed Denial of Services (DDoS) Attacks                      8
    2.5 Web Site Hacks & Web-Based Exploits                                8
                                                                               In the fourth quarter of 2008, observed distributed denial of service (DDoS)
    2.6 TCP-Based Attacks                                                  9
                                                                               attack traffic continued to target a consistent set of ports, though it appears
    2.7 McColo Shutdown                                                    9
                                                                               that some are now being targeted by a new set of network worms. In addition,
    2.8 SSL Vulnerability                                                 10
    2.9 DNSSEC                                                            10   it appears that spikes in attack traffic may be correlated with patch releases or
                                                                               security advisories issued by Microsoft, as hackers rush to exploit vulnerabilities
    3: networkS and web SIteS: ISSueS & ImprovementS                      11
    3.1 Network Outages                                                   11   before system administrators can apply software patches.
    3.2 Routing Issues                                                    12
    3.3 Peering Issues                                                    13   Two large-scale network outages occurred during the quarter, as undersea
    3.4 Web Site Outages                                                  13   cables were once again severed in the Mediterranean, and as Sprint-Nextel
    3.5 Significant New Connectivity — Undersea Cables                    15   de-peered their network from Cogent Communications. However, global
    3.6 Significant New Connectivity — Wireless                           15   connectivity continued to become more robust, with new WiMAX and 3G
    3.7 Significant New Connectivity — Fixed Broadband                    16   mobile broadband services being announced or launching in a number of
    3.8 DNS Expansion                                                     17   countries, and the introduction of DOCSIS 3.0 services and additional fiber-
    3.9 IPv6                                                              17   to-the-home initiatives, which are bringing higher speed connectivity to
    4: Internet penetratIon                                               18   subscribers in multiple countries.
    4.1 Unique IP Addresses Seen By Akamai                                18
    4.2 Internet Penetration, Global                                      19   In the fourth quarter, six countries connected to Akamai’s network at average
    4.3 Internet Penetration, United States                               20
                                                                               speeds in excess of 5 Mbps, and for the year, many countries showed
    5: GeoGraphy                                                          21   significant increases in their levels of high broadband (>5 Mbps) adoption.
    5.1 Average Connection Speeds, Global                                 21
                                                                               Decreases in the percentage of narrowband (<256 Kbps) connections to
    5.2 Average Connection Speeds, United States                          21
                                                                               Akamai were also seen both internationally and in the United States, likely due,
    5.3 High Broadband Connectivity: Fastest International Countries      24
                                                                               in part, to the growth in availability of, and options for, broadband connectivity.
    5.4 High Broadband Connectivity: Fastest U.S. States                  25
    5.5 Broadband Connectivity: Fast International Countries              26
    5.6 Broadband Connectivity: Fast U.S. States                          27
    5.7 Narrowband Connectivity: Slowest International Countries          28
    5.8 Narrowband Connectivity: Slowest U.S. States                      29
    6: appendIX: Selected InternatIonal data                              30
    7: endnoteS                                                           31




2                  © 2009 Akamai Technologies, Inc. All Rights Reserved                            © 2009 Akamai Technologies, Inc. All Rights Reserved              3
Section 2: Security

Akamai maintains a distributed set of agents deployed                     2.1 Attack Traffic, Top Originating Countries                     In December, IT security firm Sophos published1 its                   destined for over 20,200 unique ports. Obviously, there is
across the Internet that serve to monitor attack traffic.                 During the fourth quarter of 2008, Akamai observed                Security Threat Report 2009, which examined the security              a significant “long tail” that occurs – the top 200 target
Based on the data collected by these agents, Akamai                       attack traffic originating from 193 unique countries              threat landscape over the course of 2008. The report                  ports only account for 73% of the observed attack traffic
is able to identify the top countries from which attack                   around the world, up nearly 8% from the third quarter             noted that the top 5 malware-hosting countries in 2008                from the United States.
traffic originates, as well as the top ports targeted                     count of 179 countries. This quarter, the United States           consisted of the United States, China (including Hong
by these attacks. (Ports are network layer protocol                       moved into the first place slot for the first time in 2008,       Kong), Russia, Germany, and South Korea. It is interest-              For the third consecutive quarter, Port 445 (Microsoft-
identifiers.) This section, in part, provides insight into                after placing second to China or Japan throughout                 ing to note that these countries have also all consistently           DS) held the first place spot, with a slightly higher
Internet attack traffic, as observed and measured by                      the year. Argentina returned to the top 10 again in the           been among the top 10 countries from which Akamai                     percentage of the overall observed traffic than in the
Akamai, during the fourth quarter of 2008. While                          fourth quarter — it was ranked fifth for first quarter            has observed attack traffic originating in during 2008.               third quarter, and still below second quarter levels. This
some quarter-over-quarter trending may be discussed,                      attack traffic. Throughout 2008, the United States,                                                                                     port represented over half of the attack traffic observed
it is expected that both the top countries and top                        China, Taiwan, South Korea, and Japan were consistently           2.2 Attack Traffic, Top Target Ports                                  from Argentina in the fourth quarter, approximately a
ports will change on a quarterly basis.                                   among the top 10 countries that generated the highest             During the fourth quarter of 2008, Akamai observed                    quarter of the attack traffic from the United States and
                                                                          percentages of attack traffic.                                    attack traffic targeted at just over 20,800 unique                    Russia, and around a third of observed attack traffic
This section also includes information on selected                                                                                          ports, over eight times more than in the third quarter.               coming from Taiwan, Japan, Brazil, and Germany. While
DDoS attacks, Web site hacking attempts, Web-based                        The trend in attack traffic distribution continues to be          Consistent with prior quarters, some of the attack traffic            this port was previously associated with the Sasser
exploits, and other attacks and events as published                       relatively consistent with the prior quarters, with the           targeted services on well-known ports. Due to the                     worm, it appears that it is also2 associated with the
in the media during the fourth quarter of 2008. Note                      top 10 countries as the source for just under 72% of              significant growth in port count, the attack traffic was              Gimmiv.A worm, which exploited a vulnerability3 that
that Akamai does not release information on attacks                       observed attack traffic. (This is down slightly from prior        slightly less concentrated than in prior quarters, with the           was considered to be significant enough to ultimately be
on specific customer sites and that selected published                    quarters, where the top 10 countries accounted for                top 10 ports responsible for only 77% of the observed                 addressed by Microsoft in a patch4 released outside of
reports are simply compiled here.                                         74-78% of observed attack traffic.) The list of countries         attack traffic. (This is down from an 85% or greater                  their normal “Patch Tuesday” cycle. The Conficker worm
                                                                          within the top 10 appears to be getting more consistent,          concentration during prior quarters of 2008.) While it                is reported to also be using Port 445 and exploiting
                                                                          as observed across 2008 — the five countries listed above         is unclear exactly what is accounting for the growth in               this same vulnerability to spread across the Internet.
                                                                          appeared in the list during all four quarters, while Russia,      targeted port count, data from fourth quarter monitoring              The Conficker worm will be covered in more detail in
                                                                          Germany, and Brazil each held spots in the top 10 during          shows that the United States is clearly responsible for this          Akamai’s 1st Quarter, 2009 State of the Internet report.
                                                                          three of the four quarters in 2008.                               growth during the quarter, with originating attack traffic


          Country              % Traffic           Q3 08 %                                                                     7                                                                                    Destination       Port Use               % Traffic   Q3 08 %
                                                                                                                                                         OTHER                                Microsoft-DS
      1   united States          22.85              19.68                                               3                                                                                                           Port

      2   china                  19.30              26.85                                                                                                                                                           445               microsoft-dS             22.96     21.12
      3   Sweden                 10.67               3.86                                         8                                    9                                                                            80                www                      14.51      9.18
                                                                                                                                                 SMTP
      4   taiwan                  5.61               2.54                                                                                                                                                           139               netbIoS                  11.56     21.09
      5   South korea             2.52               9.37                                                                                                                                                           22                SSh                      10.78      9.73
                                                                                                                                            GhostSurf
      6   argentina               2.51               0.39                                                                                                                                                           135               microsoft-rpc             7.15     10.68
                                                                             1                                                             VNC Server
      7   russia                  2.33               1.94                                                                                                                                                           1433              microsoft SQl Server      2.46      3.20
                                                                                                                                       5
      8   Germany                 2.15               2.20                                                                                   (multiple)                                               WWW            8000              (multiple)                2.14      0.87
                                                                                                                  2
      9   Japan                   2.00               3.13                                         10                                          Microsoft
                                                                                                                                                                                                                    5900              vnc Server                2.07      1.93
     10   brazil                  1.68               2.64                           6                                                         SQL Server                                                            7212              GhostSurf                 1.93      0.74
                                                                                                                                   4
      –   other                  28.38                 –                                                                                                                                                            25                Smtp                      1.89      2.28
                                                                                                                                             Microsoft-RPC                                                          various           other                    22.56         –
                                                                                                                                                                                         NetBIOS
Figure 1: Attack Traffic, Top Originating Countries                                                                                                                 SSH

                                                                                                                                            Figure 2: Attack Traffic, Top Target Ports




4                                          © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                          © 2009 Akamai Technologies, Inc. All Rights Reserved                                      5
Section 2: Security (continued)

For the first time in 2008, Port 80 (WWW) moved into                 2.3 Attack Traffic, By Day
second place in the top 10. SQL injection attacks cont-              After previous issues of Akamai’s State of the Internet
inued to be a popular attack vector in the fourth quarter,           report were published, it was suggested that attack traffic
as noted in Section 2.5. The significant growth in obser-            patterns may have a correlation with Microsoft’s “Patch
ved attack traffic to this port may be due to scans looking          Tuesday” updates — a so-called “Attack Wednesday”
for Web servers that are vulnerable to such attacks.                 following the Tuesday release of patches by Microsoft, as
Interestingly, Port 80 was responsible for over 93% of the           attackers looked for unpatched systems in order to exploit
attacks that were observed to be originating in Sweden.              those specific vulnerabilities. However, looking at obser-
                                                                     ved attack traffic from the fourth quarter, aggregated
Attacks targeted at Port 8000 also grew significantly in             by day of week, it does not appear that this suggested
the fourth quarter, enough to push it into the top 10                correlation necessarily holds, as is shown in Figure 3.
list. Officially,5 Port 8000 is used for the “iRDMI” service,
                                                                                                                                   Figure 4: Attack Traffic, by Day of Quarter
though it is unclear what this service is, or what it is             In fact, it appears that Wednesdays accounted for the
used for. However, the port is also6 reportedly used by              lowest percentage of weekday traffic during the fourth        peak seen on December 18 did follow an out-of-band                      day11 by Microsoft, warning that systems running various
a number of other software packages, and is also often               quarter, though still ahead of the percentage of attacks      update9 issued by Microsoft that addressed a critical                   older versions of SQL Server were vulnerable to attack,
used as an alternative default port for HTTP traffic. It is          that was observed on Saturdays and Sundays.                   vulnerability in some versions of their Internet Explorer               and the traffic seen that day has a high likelihood of
not known which piece of software that binds to Port                                                                               Web browser, and the near-doubling of attack traffic                    being attempted SQL injection attacks.
8000 was targeted by these attacks.                                  However, looking at attack traffic by day across the          seen on that day may be related to that vulnerability. In
                                                                     quarter, a significant increase occurred on November 19,      addition, the massive spike that was seen on December                   Comparing the levels of attack traffic targeted at the
Port 7212 also made its first appearance in the top 10               and attack traffic remained elevated throughout the rest      5 followed the posting of an “Advanced Notification”10                  top three Microsoft-related ports (445, 139, and 135)
during the fourth quarter. During the third quarter, this            of the quarter, as shown in Figure 4.                         by Microsoft of the security bulletins that were going to               aggregated across the fourth quarter, and charting the
port was the top target port for attacks seen from China                                                                           be released the following Tuesday. Again, this increase in              levels by day of week, they all appear to follow a similar
— in the fourth quarter, it was the third most targeted              It is interesting to note that November 19 is, in fact,       attack traffic may have been related to attackers rushing               pattern. The number of attacks reaches the highest levels
port for China-sourced attacks. Please refer to Akamai’s             a Wednesday, but did not follow a “Patch Tuesday”             to exploit the related vulnerabilities ahead of patches                 early in the week, bottoming out on Thursday, and then
3rd Quarter, 2008 State of the Internet report for                   release — Microsoft Security Bulletins MS08-0687 and          being issued. Finally, the spike seen on December 22 can                increasing again into the weekend, as shown in Figure 5.
additional details on Port 7212 vulnerabilities.                     MS08-0698 were released a week prior. However, the            likely be correlated with a security advisory issued that               This traffic pattern may also be influenced by Microsoft’s



                                                                                                                                                                                                                                                                135
                                                                                                                                                                                                                                                                139
                                                                                                                                                                                                                                                                445




                                                                                                                                           Sunday          Monday            Tuesday          Wednesday           Thursday              Friday   Saturday




Figure 3: Attack Traffic, Aggregated by Day of Week                                                                                Figure 5: Attack Traffic Targeting Ports 445, 139, and 135 by Day of the Week



6                                     © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                       © 2009 Akamai Technologies, Inc. All Rights Reserved                                 7
Section 2: Security (continued)

practice of releasing major patches on Tuesday —                    more than 4.5 million blogs) was subjected to a DDoS          SQL injection once again continued to be a popular               2.6 TCP-Based Attacks
vulnerabilities are exploited ahead of the patch releases,          attack on October 27 that caused some of its blogs to         vector for Web-based attacks during the fourth quarter.          As noted above in Section 2.2, the Conficker worm
and then as compromised systems are patched, attack                 become unavailable for a period of time. Wordpress.com        Two Adobe Web sites, Vlog It and Serious Magic, were             exploits services running on TCP port 445, and was iden-
volume decreases.                                                   has three origin data centers and was able to reroute         compromised through SQL injection in October, accord-            tified as a key component in a botnet that was estimated
                                                                    the relevant traffic to unaffected servers once the DDoS      ing to Internet security firm Sophos.20 In November,             to include approximately half a million compromised
2.4 Distributed Denial of Service                                   attack had been identified and isolated.15                    security firm Kaspersky Lab discovered 1,200 Web sites           systems by early December.30 The Conficker worm will
    (DDoS) Attacks                                                                                                                around the world that had been compromised by an SQL             be covered in more detail in Akamai’s 1st Quarter, 2009
The Internet celebrated an auspicious occasion on                   2.5 Web Site Hacks & Web-Based Exploits                       injection attack that appeared to originate from China.21        State of the Internet report.
November 2, 2008, the 20th anniversary of the “Morris               In December, the Koobface virus resurfaced on Facebook.       In late December, Microsoft issued a warning22 about a
Worm”, arguably the first major denial of service attack            The virus leverages malware unknowingly downloaded by         critical bug in its SQL server software that could be            2.7 McColo Shutdown
on the Internet. According to a published report,12 the             users, which sends out messages to their Facebook friends,    exploited by attackers.                                          In mid-November, hosting provider McColo Corp. was
worm was written by then Cornell University student                 urging them to click on a link that takes them to an infec-                                                                    disconnected from the Internet. Identified as a major host
Robert Tappan Morris, who was later convicted of com-               ted Web site,16 as well as hijacking search requests made     As initially described in the 3rd Quarter, 2008 State of         of organizations engaged in sending unsolicited e-mail
puter fraud for the incident. Morris is now an associate            to popular search sites such as Google, Yahoo, and MSN.       the Internet report, the Web-based attack vector known           (“spamming”), it was reported that McColo had been
professor of computer science at MIT. Launched on                                                                                 as “clickjacking” gained additional exposure during the          responsible for up to 75% of all spam sent each day.31
November 2, 1988, the Morris worm disabled approxi-                 As discussed in the previous two issues of the State of the   fourth quarter. In early October, an Israeli research
mately 10% of all Internet-connected systems. The worm              Internet report, cross-site scripting (XSS) continues to be   released a proof-of-concept demo that highlighted the            In addition to reducing spam volumes across the Internet,
was a self-replicating program that exploited known                 a problem. In October, Yahoo fixed an XSS error in the        threat posed the clickjacking flaw.23 Days later, Adobe          the disconnection of McColo also served to disrupt the
weaknesses in common utilities including e-mail software            hotjobs.yahoo.com domain that allowed attackers to in-        posted24 a workaround procedure to help mitigate                 “Rustock” and “Srizbi” botnets, crippling an estimated
sendmail, as well as Finger, a tool that showed which               ject JavaScript code into the page that silently copied the   exposure, and subsequently released a Flash Player               500,000 compromised systems (“bots”).32 Although
users were logged on to a given computer.                           cookies used to authenticate Yahoo users when they log        update25 that addressed the security vulnerabilities.            the Srizbi botnet control servers resurfaced at an ISP in
                                                                    in to sections of the site that require a password. Attack-                                                                    Estonia, that ISP quickly cut off connectivity to those
Several high-profile Web sites suffered DDoS attacks                ers, using these cookies, then had broad control over the     In October, a researcher at Aladdin Knowledge Systems            servers.33 Unfortunately, the Srizbi bots gradually
during the fourth quarter. The BBC Web site was subjec-             victim’s Yahoo account, including Yahoo e-mail and any        announced that that he had discovered a cache of user-           became active again through updates to their code, and
ted to a DDoS attack on November 6 that crippled the                other service that uses authentication cookies belonging      names and passwords for over 200,000 Web sites,                  it appeared that several weeks after the McColo shut-
Web site’s performance significantly. During the attack,            to the yahoo.com domain.17 In December, it was discovered     including 80,000 that had been modified with malicious           down that spam volumes were once again on the rise.34
the BBC Web site responded very slowly, and measure-                that an XSS error on americanexpress.com allowed attack-      content.26 According to the researcher, the 200,000
ments made by monitoring service Pingdom showed that                ers to steal users’ authentication cookies, which are used    compromised sites included those belonging to govern-
for a total of 1 hour and 15 minutes it did not respond             to validate American Express customers after they enter       ments, Fortune 500 companies, universities and other
at all.13 The Web site for “NO on Prop 8” (opposing                 their login credentials.18 However, the security hole was     businesses; more than half of the affected sites belonged
Proposition 8, which would eliminate same-sex couples’              closed within an hour after an article about it was posted    to European companies and organizations. Other Web
right to marry in California) was hit by a DDoS attack              on IT news Web site The Register. Four XSS bugs on the        sites hacked in the fourth quarter included those belong-
that took the site down for several hours on October 29,            Facebook Web site were also publicized and quickly            ing to online bill payment company CheckFree,27 the
with attack traffic originating from computers not just             addressed in December.19                                      Ohio Secretary of State,28 and the World Bank.29
within California, but also from Texas, New Jersey and
Georgia.14 The Wordpress.com blog platform (hosting




8                                    © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                 © 2009 Akamai Technologies, Inc. All Rights Reserved                             9
Section 3: Networks and Web Sites:
Section 2: Security (continued)                                                                                                                 Issues & Improvements

2.8 SSL Vulnerability                                               2.9 DNSSEC                                                       The fourth quarter of 2008 saw another significant                 an alternate submarine cable through Puerto Rico.43
On December 30, it was announced at the 25th Chaos                  Following the DNS exploit described by Dan Kaminsky              network outage in the Mediterranean, as a result of three          On December 8, over a million subscribers of Time
Communication Congress that researchers had found a                 in the third quarter, and the subsequent push for the            undersea cables being severed. A peering dispute between           Warner Cable saw their Internet connectivity impaired
way to target a known weakness in the MD5 algorithm                 implementation of DNSSEC, the Internet Corporation for           Sprint-Nextel and Cogent Communications effectively                for approximately two-and-a-half hours due to the
to create a rogue Certification Authority (CA) that would           Assigned Names and Numbers (ICANN),38 VeriSign,39 and            partitioned the Internet, preventing single-homed custo-           failure of Time Warner’s DNS servers.44
allow them to create “fake” SSL certificates that would             the United States Department of Commerce National                mers of both providers from reaching one another. In
still be fully trusted by all modern Web browsers.35 As of          Telecommunications and Information Administration                addition, a number of high profile Web sites experienced           Eerily echoing events of January 2008, on the morning
the time of the announcement, at least six CAs were                 (NTIA)40 all issued proposals regarding the cryptographic        availability problems throughout the quarter due to a              of December 19, three key underwater cables in the
using the MD5 algorithm to sign SSL certificates, and the           signature of the DNS root zone. NTIA invited interested          variety of reasons, including power outages and flash              Mediterranean (SeaMeWe-3, SeaMeWe-4 and FLAG)
researchers estimated that 30-35% of all SSL certificates           stakeholders to file comments on the proposals, and              crowds. Many new WiMAX initiatives were announced,                 were severed, which impacted Internet traffic in the
currently in use had an MD5 signature somewhere in                  received more than 30 comments in favor of securing              which are likely to bring wireless broadband connectivity          Middle East and the Indian subcontinent.45 According
their authentication chain.36                                       the root zone. Commenters included representatives of            to users in countries around the world, and new fiber-to-          to measurements from Renesys, more than 1,400 of
                                                                    the Internet Architecture Board, the Internet Society,           the-home initiatives and DOCSIS 3.0 rollouts brought               Egypt’s and more than 450 of India’s globally routed
Because the digital signature on the fake certificate               Akamai Technologies, NeuStar, Afilias, and Comcast.41            extremely high-speed wired broadband connectivity to               prefixes (networks) suffered outages, as shown in Figure
appears to come from a reputable and presumably trust-                                                                               users in North and South America, Asia, and Europe.                6. Repairs to the SeaMeWe-3 and SeaMeWe-4 cables
worthy CA, a user’s browser will accept it and indicate to          In the meantime, seven leading domain name vendors,                                                                                 began two days later, as the repair ship “Raymond
the user that the connection is secure. Coupled with the            representing more than 112 million domain names                  3.1 Network Outages                                                Croze” was dispatched by France Telecom.46 Unfortu-
DNS attack described by Dan Kaminsky, users could be                (65% of all registered domain names) formed the                  On December 4, equipment failure caused a complete                 nately, as France Telecom finished repairing the
redirected to malicious sites without being aware of it.            DNSSEC Industry Coalition to work together to drive the          loss of Internet connectivity for two of the three ISPs in         SeaMeWe-4 cable on December 25, the cable broke
These rogue e-commerce or banking sites, for example,               adoption of DNSSEC across all domain name registries             Haiti that connect to the Internet through the ARCOS               again in a different place, which pushed out repairs until
would appear trusted, and could make the collection of              and registrars around the world.42 Participants in the           submarine cable. The outage lasted for approximately               approximately 10 days later than originally expected.47
login or other personal data fairly simple for an attacker          coalition include VeriSign (.com, .net), The Public Interest     three-and-a-half hours until traffic was re-routed through
without raising a user’s suspicion.                                 Registry (.org), Nominet UK (.uk), Afilias (.info), NeuStar
                                                                    (.biz, .us), the Foundation for Internet Infrastructure (.se),
Two days after the announcement, VeriSign announced                 and Educause (.edu). While the primary goal of the
that they would be transitioning from the MD5 algorithm             coalition is to accelerate the deployment of DNSSEC,
to the SHA-1 algorithm for digital certificates they issued,        the participants noted that it would be “unrealistic” to
and security researchers encouraged other CAs to do                 set forth a timetable for deployment until the issues
the same.37                                                         surrounding signature of the DNS root zone are resolved.




                                                                                                                                     Figure 6: Network Outages by Country (Data courtesy of Renesys)




10                                   © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                      © 2009 Akamai Technologies, Inc. All Rights Reserved                             11
Section 3: Networks and Web Sites:
           Issues & Improvements (cont’d)

A Reuters article48 noted that the three severed cables            3.2 Routing Issues                                               3.3 Peering Issues                                                3.4 Web Site Outages
were the most direct route for moving traffic between              On November 10, Companhia de Telecomunicacoes do                 On October 30, the network link between Cogent and                The Web site of file sharing service Yousendit was
Western Europe and the Middle East, and that Verizon               Brasil Central (CTBC) inadvertently leaked a nearly-full         Sprint-Nextel disappeared; from a routing perspective —           unavailable for over 5 hours in total, due to four separate
had rerouted some of its traffic by sending it across              set of routing information to two of its upstream network        Sprint de-peered Cogent. As a result, customers of                outages that occurred on November 17. The shortest
the Atlantic, then the United States, across the Pacific,          providers, in essence hijacking most of the Internet’s           Cogent lost access to networks connected to Sprint, and           outage lasted 30 minutes and the longest lasted 2 hours
and on to the Middle East. It is important to note that            address space. The data was not generally propagated             vice-versa.50 Cogent is no stranger to peering disputes,          and 25 minutes.56 XCalibre Communications’ FlexiScale
Akamai’s services can help customers maintain consistent           to the Internet at large, though, preventing another             and had been involved in at least four prior incidents over       on-demand utility computing platform experienced
site and application performance and availability when             YouTube-like issue that occurred earlier in the year. (See       the last six years — AOL in 2003, France Telecom in               another big outage in late October. The outage lasted
such cable cuts occur, and when alternate routes force             Section 3.3 of Akamai’s 1st Quarter, 2008 State of the           2006, Level 3 in 2005 and TeliaSonera in March 2008.51            approximately 18 hours and was reportedly due to near-
traffic across continents and oceans. Figure 7 illustrates         Internet report for additional details on the YouTube            A related post52 on the Renesys blog noted that 289               simultaneous failures in the switches that connect the
the results of a performance test for a customer portal            issue.) Ultimately, the leak had no significant global impact.   autonomous systems (networks) are completely single-              storage to the processing nodes.57 Google’s Gmail service
hosted in Europe, as seen by Akamai’s AsiaPac measure-             However, it did make its way to RIPE’s route collector in        homed (have no connectivity to the Internet through               continued to have problems in the fourth quarter,
ment agents. As shown, the measurement agents saw a                Sao Paolo, Brazil, where a volunteer-based route monitor-        anyone else) behind Cogent, and that 214 are completely           experiencing an outage starting on October 15 that
significant degradation in performance when trying to              ing project noticed the leaked announcement and                  single-homed behind Sprint. In addition, Renesys noted,           lasted approximately 30 hours.58 Some additional avail-
retrieve content from the origin during the two days               notified subscribers via e-mail of the hijacking.49 While        due to Cogent’s aggressive pricing, there are a large             ability issues impacting Gmail reportedly also occurred
before repairs began. However, portal performance as               there was little impact to the Internet as a whole, the          number of service providers that are multi-homed but              on Monday, October 20.59
delivered by Akamai’s IP Application Accelerator service           event served to underscore the challenges that surround          that send all of their outbound traffic through Cogent by
remained consistent throughout the duration of the                 monitoring for, and alerting on, significant route changes.      default. Consequently, this de-peering prevented traffic          Problems dealing with “flash crowd” traffic also caused
cable cut, as Akamai is able to identify and send traffic                                                                           originating from those users from reaching Sprint-                outages at a number of Web sites during the fourth
over alternative network paths on a real-time basis.                                                                                connected users. Unsurprisingly, Sprint PCS was one of            quarter. The Openoffice.org site crashed on October 14,
                                                                                                                                    the networks single-homed to Sprint’s network, meaning            due to overwhelming demand for its new 3.0 software
                                                                                                                                    that users of mobile devices using Sprint’s cell phone            release.60 The Europeana digital library enjoyed a high-
                                                                                                                                    services may have had problems connecting to Web sites            profile launch on November 20, but the system was
                                                                                                                                    and online services connected to Cogent.                          swamped by an unexpected 10 million user requests per
                                                                                                                                                                                                      hour and crashed within 24 hours of its launch.61 The
                                                                                                                                    Published reports53 indicated that the peering dispute            Web site for Dr. Pepper was unavailable for large parts
                                                                                                                                    was sourced in a disagreement over payments that Sprint           of the day on November 23, as the result of a surge of
                                                                                                                                    claimed it was owed for ongoing traffic exchange after a          traffic related to a one-day marketing promotion that
                                                                                                                                    peering trial that ended in September 2007 — Cogent’s             promised everyone in America a free bottle of soda if
                                                                                                                                    executives believed that the results of the trial had             the new Guns n’ Roses album was released during 2008.
                                                                                                                                    qualified them for settlement-free peering. However,              Dr. Pepper ultimately elected to extend the offer an extra
                                                                                                                                    on November 2, Sprint re-enabled the connection with              day and add more server capacity to handle the load.62
                                                                                                                                    Cogent,54 and on December 22, Sprint and Cogent                   Web sites can leverage the on-demand capacity available
Figure 7: Akamai Download Performance Remained Consistent Despite Cable Cut
                                                                                                                                    announced that they had reached a multi-year intercon-            through Akamai’s site delivery services to help them
                                                                                                                                    nection agreement for the purposes of exchanging                  avoid traffic-related site downtime or the need to add
                                                                                                                                    Internet traffic.55                                               additional server capacity.




12                                  © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                     © 2009 Akamai Technologies, Inc. All Rights Reserved                             13
Section 3: Networks and Web Sites:
           Issues & Improvements (cont’d)

High traffic levels and application problems combined to             able for nearly three hours on November 18 while it         3.5 Significant New Connectivity —                                  end-to-end connection — if a link is lost, the
take various U.S. Postal Service Web-based services                  migrated to a new server facility.71 A “catastrophic”           Undersea Cables                                                 communication node will store the information until
offline the week of December 8. Several different online             UPS failure caused a power outage on November 13 at         A report published in December by telecommunications                the connection is re-established.
tools, including the Postal Service’s popular Click-N-Ship           a Santa Clara data center operated by Quality Technology    research firm Telegeography noted74 that rapid growth in
service, suffered outages.63 Most tools were available               Services, triggering days of performance problems for       Internet capacity around the world over the last decade            Closer to Earth, O3b Networks continues to sign contracts
again by Monday afternoon, but the Click-N-Ship service              the social network Friendster. Although the hosting         has led to a diminished role for the United States as an           to bring Internet connectivity to remote regions using
was not fully functional again until Friday, December 12.64          facility was back on generator power within two hours,      Internet hub, with dramatic shifts in the amount of traffic        satellites in equatorial orbit. In December 2008, O3b
                                                                     Friendster remained offline for more than 23 hours over     that passes through the United States from other conti-            announced that Afghani telco Neda Telecommunications
A number of social networking and related sites                      a three day period.72                                       nents. Telegeography found that in 1999, 91% of data               will deploy its Quick Start service as a means for connect-
experienced varying amounts of downtime in the fourth                                                                            from Asia passed through the United States at some                 ing to the Internet, though service activation is not
quarter. The blog search engine Technorati experienced               Looking back across all of 2008, Pingdom published73        point on its journey, but by 2008, that had fallen to just         expected until late 2010.77 In Libya, users working or
both downtime and slower performance for more than                   a report entitled “Social Network Downtime in 2008,”        54%. In 1999, 70% of data from Africa passed through               located in remote areas now have access to satellite-
nine hours on December 12 and 13.65 Dating website                   which analyzed the Web site availability (uptime) of 15     the United States, but by 2008, that number decreased              based connectivity through portable satellite broadband
Match.com experienced technical difficulties and was                 of the world’s largest social networks. Pingdom noted       to just 6%. One key reason for this decline has been               terminals, with speeds up to 444 Kbps.78 Finally, in Dec-
unavailable for more than an hour and a half on October              that Facebook and MySpace, the two largest social           the growth in inter-regional connectivity made possible            ember, California-based Viasat announced a plan to put
29.66 Business networking site LinkedIn was down for                 networks monitored, both had very little downtime in        by numerous submarine cable projects, including those              a broadband Internet satellite into orbit above the U.S.
over an hour on October 10,67 and experienced an                     2008. Only four social networks that were monitored for     covered in previous editions of Akamai’s quarterly                 in the first half of 2011.79 According to Viasat, the sat-
additional hour-long outage on November 16.68 Hosted                 the full year achieved overall uptime of 99.9% or better:   State of the Internet reports.                                     ellite will have an overall throughput of 100 Gbps, which
blogging service Typepad was down for an hour on                     Facebook (99.92%), MySpace (99.94%), Classmates.com                                                                            it claims should enable it to support 2 Mbps service to
October 3,69 and micro-blogging service Twitter exper-               (99.95%), and Xanga (99.95%). Figure 8 illustrates the      In the Middle East, the Cyprus Telecommunications                  approximately 2 million subscribers when operational.
ienced a brief outage on November 13, lasting just under             aggregate downtime (in hours) that Pingdom observed         Authority (Cyta) and the Syrian Telecommunication                  Viasat’s plans parallel an effort by Eutelsat in Europe
an hour, due to a DNS configuration error.70 Popular                 for the social networks that it was monitoring.             Establishment (STE) have agreed75 to upgrade the                   to launch a high capacity broadband satellite in 2010.
blogging/social networking site LiveJournal was unavail-                                                                         UGARIT submarine cable link between Tartous in Syria
                                                                                                                                 and Pentaskhinos in Cyprus in order to increase Internet           Akamai’s 3rd Quarter, 2008 State of the Internet report
                                                                                                                                 capacity between the two countries. The 239km UGARIT               noted that Sprint-Nextel had launched the “Xohm”-
                                                                                                                                 cable began operations in 1995, and its transmission               branded WiMAX service in Baltimore, Maryland. During
                                                                                                                                 capacity is limited to 622 Mbps, which is also driving the         the fourth quarter, Sprint-Nextel completed the
                                                                                                                                 two companies to initiate feasibility studies for establish-       formation of a WiMAX joint venture with Clearwire,
                                                                                                                                 ing a second submarine link between their countries.               and re-branded the service as “Clear”.80 The first city
                                                                                                                                                                                                    expected to get the new “Clear” WiMAX service is
                                                                                                                                 3.6 Significant New Connectivity — Wireless                        Portland, Oregon in early January 2009.81
                                                                                                                                 Representing possibly the extreme in “wireless” Internet
                                                                                                                                 connections, in November 2008, NASA reported the first             Internationally, announcements of new WiMAX networks
                                                                                                                                 successful tests of its Deep Space Network, which is               surged in the fourth quarter of 2008. During the quarter,
                                                                                                                                 modeled after the Earth-bound Internet.76 The Deep                 Telegeography’s CommsUpdate daily briefings82 highlight-
                                                                                                                                 Space Network relies upon Disruption-Tolerant                      ed announcements of new or expanded WiMAX networks
Figure 8: Social Network Downtime in 2008, in hours (Data courtesy of Pingdom)
                                                                                                                                 Networking (DTN) that does not assume a continuous                 in Australia,83 Bahrain,84 Barbados,85 Bermuda,86 Brazil,87




14                                    © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                 © 2009 Akamai Technologies, Inc. All Rights Reserved                             15
Section 3: Networks and Web Sites:
           Issues & Improvements (cont’d)

Cameroon,88 Iraq,89 Italy,90 Jordan,91 Kenya,92,93 Malaysia,94       Foundation whitepaper116 published in November.                 the government called on telecommunications                       However, by the end of the comment period in mid-
Montenegro,95 Netherlands,96 Pakistan,97 Romania,98                  According to the paper, the idea is that “Consumers             providers119 to offer broadband services across all its           December, the United States Department of Commerce,
South Africa,99 Spain,100 and Sri Lanka.101                          may one day purchase and own fiber connections that             territory for a maximum of €35 ($45.15) a month. This             the Australian government, members of the global bus-
                                                                     run from their homes. They would then be able to                makes France the first country in the European Union              iness community, and over 200 commenters on the posted
Telegeography also highlighted the launch of 3G-based                connect to a variety of service providers, including today’s    to effectively mandate the supply of broadband services.          proposal expressed significant opposition to ICANN’s plan,
mobile broadband services in Canada,102 Japan,103 the                Internet, television, and telephone services, as well as        France Telecom and SFR plan to include broadband                  urging them to “go back to the drawing board and
United Kingdom,104 and Uzbekistan.105                                ultra-bandwidth intensive services of the future.” The          among their universal services by the end of 2009.                propose a process that results in a responsible expansion
                                                                     paper’s authors also propose that the fiber would form                                                                            of the name space, not merely a duplication of it.” 124
3.7 Significant New Connectivity —                                   part of the property right in the home. However, they           In the United States, an economic stimulus bill signed in
    Fixed Broadband                                                  note that no market for consumer purchase of fiber              February 2009 reportedly provides $7.2 billion devoted            3.9 IPv6
The launch of DOCSIS 3.0 is enabling cable providers                 currently exists, but they are looking at one trial that is     to broadband funding, aimed at creating incentives for            According to published reports, the adoption of IPv6
to roll out higher-speed connectivity options to their               already ongoing in Ottawa, Canada as a means to test            additional infrastructure buildout and the development            continued a slow, steady growth into the end of 2008.
customers, with Comcast106 announcing availability of                their model’s feasibility and identify associated challenges    of a comprehensive national broadband plan by the                 A blog post125 at Internet infrastructure news & opinion
service tiers up to 50 Mbps in multiple cities across the            and insights.                                                   FCC.120 This “broadband stimulus” will be examined in             site CircleID notes that at the end of the year, 4% of
United States; Virgin Media107 in the United Kingdom                                                                                 more detail in Akamai’s 1st Quarter, 2009 State of the            autonomous systems on the Internet supported IPv6,
launching a 50 Mbps service; and UPC Netherlands108                  Also in Canada, the Saskatchewan government                     Internet report.                                                  up from 2.4% at the beginning of 2008. In addition,
offering access at speeds of 60-120 Mbps.                            announced in late November that they aim to have                                                                                  the Number Resource Organization (NRO), which is made
                                                                     100% broadband coverage across the Canadian territory           3.8 DNS Expansion                                                 up of the five Regional Internet Registries (RIRs), announ-
A number of announcements were also made regarding                   within three years under a new CAD $129 million                 According to the Domain Name Industry Brief report                ced126 in early December that the rate of new entrants
fiber-to-the-home (FTTH) initiatives in several countries.           infrastructure rollout plan. Regional incumbent telecom         published121 by VeriSign, 2008 ended with a total of              into the IPv6 routing system has increased by approx-
In Switzerland, Swisscom began to connect households                 SaskTel’s fixed broadband network footprint will be             177 million domain name registrations across all of the           imately 300 percent over the past two years. Additional
to the neighborhood fiber-optic nodes they had pre-                  expanded to cover 100% of the population, up from               Top Level Domains (TLDs), representing 16% growth                 IPv6 statistics presented at the RIPE 57 meeting in
viously deployed.109 In an interesting move, Swisscom will           86% coverage today, through an expansion of the                 over the previous year and 2% growth over the third               October were highlighted in another127 CircleID blog
be laying several fibers per household to enable invited             existing CommunityNet high speed network, upgraded              quarter of 2008. More than 10.1 million new domain                post, including data on IPv6 traffic by country, OS
partners in the telecommunications, cable, and utilities             rural backbone infrastructure, and a partnership with a         names were registered across all of the TLDs in the fourth        support, access methods, and IPv6-related latency.
industries to expand their own fiber-optic infrastructure.           satellite firm in order to provide access to the most           quarter of 2008, reflecting slower growth in new regis-
One fiber will be used by Swisscom, while the others will            remote areas.117                                                trations, with a decline of 12% from the third quarter.           However, research presented at the Proceedings of the
be made available to the potential partners. In November,                                                                                                                                              ACM Internet Measurement Conference, based on what
Netherlands telco KPN and FTTH operator Reggefiber                   Similarly, in November, Finland’s government said118 that       As highlighted in the 2nd Quarter, 2008 State of the              the researchers claim is “the first complete census of the
said that they are planning to roll out a FTTH network               it will invest up to €66 million ($85.2 million) as part of     Internet report, in October, ICANN published a draft              Internet in more than two decades”, discovered a surpri-
that could cost as much as 7 billion euros that is planned           plans to increase high speed broadband coverage across         “Applicant Guidebook” for new generic TLDs, and posted             sing number of unused IPv4 addresses and concluded
to cover pretty much every part of the Netherlands.110               the country. The investment is part of an effort to             it online for review and comment.122 According                    that many will still be unused in two years when IPv4
Additional FTTH service announcements were made by                   increase access to 100 Mbps connectivity in Finland to          to published reports,123 ICANN would charge groups                address space was projected to be exhausted.128 “There
Brasil Telecom (Brazil),111 MTNL (India),112 Telefonica              100% of the population by 2016. The expectation is that         $185,000 to apply for a generic TLD, with most of the             are huge chunks of IP space which are not allocated yet,
(Spain),113 Telecom Italia (Italy),114 and TTK (Russia).115          by 2015, approximately 95% of the population will have          money going toward evaluation of the application.                 and also giant swaths which are inefficiently allocated,”
                                                                     access to the higher broadband speeds through commer-           ICANN’s plan would open up TLDs to non-English                    the researchers noted.
Also in the fourth quarter, the notion of “homes with                cial development, and by 2010 all broadband users are           character sets, and seeks to streamline a TLD-creation
tails” began to take root, popularized in a New America              expected to be able to receive at least 1 Mbps. In France,      process that has proven cumbersome in the past.




16                                    © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                    © 2009 Akamai Technologies, Inc. All Rights Reserved                             17
Section 4: Internet Penetration

4.1 Unique IP Addresses Seen By Akamai                                     Growth among countries in the Top 10 slowed                 4.2 Internet Penetration, Global
Through a globally-deployed server network, and by                         quarter-over-quarter — in the third quarter, three          How does the number of unique IP addresses seen                                                           1
                                                                                                                                                                                                                                        5
virtue of the billions of requests for Web content that                    countries in the Top 10 saw double digit percentage         by Akamai compare to the population of each of
it services on a daily basis, Akamai has unique visibility                 increases, while in the fourth quarter, China was           those countries? Asked another way, what is the level                                        2                4
into the levels of Internet penetration around the world.                  the big gainer at just under seven percent quarterly        of Internet penetration in each of those countries?
In the fourth quarter of 2008, over 400 million unique                     growth in unique IPs seen by Akamai’s network. South        Using 2008 global population data129 from the United                6                            7    8
                                                                                                                                                                                                                               10
IP addresses connected to the Akamai network —                             Korea also appears to be establishing a quarterly pattern   States Census Web site as a baseline, levels of Internet
almost six percent more than in the third quarter, and                     of growth and loss — the country recorded quarterly         penetration for each country around the world were                            3
                                                                                                                                                                                                                               9
over 28 percent more than the same quarter a year                          increases in the first and third quarters of 2008, and      calculated based on Akamai’s view into Internet traffic.
ago. Similar to the prior two quarters, nearly 30% of                      quarterly losses in the second and fourth quarters          The countries in the Top 10 list shown in Figure 10 were
those IP addresses came from the United States and                         of 2008. For the year, however, South Korea was up          stable from quarter-to-quarter, although there was some
                                                                                                                                                                                                                    Country                          Unique IP’s
approximately 10% came from China.                                         over 10%, adding approximately 1.5 million unique IP        shifting of positions, as Finland, Iceland, the Cayman
                                                                                                                                                                                                                                                     Per Capita
                                                                           addresses seen by Akamai.                                   Islands, and the British Virgin Islands were all ahead                   - Global                                 0.08
     Country                Q4 08           Q4-Q3          YoY                                                                         of where they were ranked in the third quarter. Globally,                1   Sweden                               0.46
                          Unique IP’s       Change        Change           On a global basis, year-over-year, Akamai saw the number    the number of unique IP’s per capita grew from 0.06                      2   norway                               0.42
    - Global              401,285,817       +5.67%        +28.38%          of unique IP addresses more than double in 19 countries     in the third quarter (and 0.05 in the first quarter) to                  3   cayman Islands                       0.40
 1   united States        114,123,038       +4.38%        +24.13%                                                                                                                                               4   Finland                              0.39
                                                                           — Turks and Caicos led the list with 695% growth.           0.08 at the end of 2008.
 2   china                 40,130,543       +6.75%        +33.08%                                                                                                                                               5   Iceland                              0.39
 3   Japan                 27,659,076       +0.53%        +13.98%
                                                                           (To be fair, this statistic is also influenced by the law                                                                            6   united States                        0.38
 4   Germany               27,361,610       +5.69%        +35.93%          of small numbers, as they ended 2008 with just under        These per capita figures should be considered as an                      7   netherlands                          0.36
 5   France                18,583,433       +4.31%        +16.82%          2,400 unique IP addresses seen by Akamai.) Sixteen          approximation, as the population figures used to                         8   denmark                              0.36
 6   united kingdom        17,781,997       +2.76%        +19.04%                                                                                                                                               9   british virgin Islands               0.35
                                                                           countries had a net loss year-over-year in the number of    calculate them are static estimates — obviously, they
 7   South korea           14,606,042       -1.68%        +10.62%                                                                                                                                              10   bermuda                              0.34
 8   canada                10,467,353       +1.64%        +11.24%
                                                                           unique IP addresses seen by Akamai — most are smaller       will change over time, and it would be nearly impossible
                                                                           African nations, remote island nations in the Pacific                                                                        Figure 10: Global Internet Penetration
 9   Spain                  9,496,698       +5.64%        +20.83%                                                                      to obtain exact numbers on a quarterly basis. In addi-
10   brazil                 8,935,698       +1.80%        +38.17%          Ocean, or countries in the midst of ongoing civil unrest.   tion, individual users can have multiple IP addresses
                                                                                                                                       (handheld, personal/home system, business laptop, etc.).
                                                                           Looking at the “long tail,” there were 187 countries with   Furthermore, in some cases, multiple individuals may be
                      6                                                    fewer than 1 million unique IP addresses connecting to      represented by a single IP address (or small number of
                                                                   3       Akamai in the fourth quarter of 2008, 146 with under        IP addresses), as they access the World Wide Web
8                                       4
                  5                                                        100,000 unique IP addresses, and 38 with fewer than         through a firewall proxy server. Akamai believes that it
1                                                                          1,000 unique IP addresses. As compared to the prior two     sees approximately 1 billion users per day, though we
                            9                                     7        quarters, these country counts remained extremely stable.   see only approximately 400 million unique IP addresses.
                                                2
                          10



Figure 9: Unique IP Addresses Seen By Akamai




18                                          © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                               © 2009 Akamai Technologies, Inc. All Rights Reserved                                19
Section 4: Internet Penetration (cont’d)                                                                                               Section 5: Geography

        4.3 Internet Penetration, United States                                  As shown in Figure 11, many states experienced                Through its globally deployed server network and by                5.1 Average Connection Speeds, Global
        For the second consecutive quarter, Akamai is examining                  moderate increases in Internet penetration quarter-over-      virtue of the billions of requests for Web content that it         This quarter, the State of the Internet report will begin
        the level of Internet penetration within the United                      quarter, while it appears that Virginia and New Jersey        services on a daily basis, Akamai has a unique level of vis-       tracking average connection speeds for countries around
        States. Using state population estimates available from                  appear to have experienced significant decreases. It is       ibility into the connection speeds of those systems issuing        the world. While quarterly variances are likely, we expect
        the United States Census Web site,130 and the number                     not clear whether this is the beginning of a longer-term      the requests, and as such, of broadband adoption around            that over the long term, the overall trend will be towards
        of unique IP addresses from each state that Akamai                       trend for these states, or just a one-time anomaly. Future    the globe. Because Akamai has implemented a distributed            higher average connection speeds as levels of broadband
        saw during the fourth quarter, we calculated the levels                  editions of this report will continue examine ongoing         network model, deploying servers within edge networks,             adoption continue to grow. Current highlights and his-
        of Internet penetration on a state-by-state basis. The                   trends in levels of Internet penetration.                     it can deliver content more reliably and more consistently         torical trends for average connection speeds on a global
        same caveats noted immediately above in section 4.2,                                                                                   at those speeds, in contrast to centralized competitors            basis can be found in Akamai’s new data visualization
        regarding per capita figures as an approximation,                                                                                      that rely on fewer deployments in large data centers.              tool, available at http://www.akamai.com/dv5.
        apply here as well.                                                                                                                    For more information on why this is possible, please see
                                                                                                                                               Akamai’s How Will The Internet Scale? white paper.131              Globally, the average connection speed was approximately
                                                                                           State                       Unique IP’s
                                                                                                                                                                                                                  1.5 Mbps — the speed of a T-1 Internet connection.
    1                                          5        3                                                              Per Capita              The data presented below was collected during the                  Looking at the top 10 globally, South Korea ranks first
                                                                             4
                                                                                       1   washington                     0.61                 fourth quarter of 2008 through Akamai’s globally-                  with average connection speed of 15 Mbps — 10x the
                                                                             7         2   Georgia                        0.59                 deployed server network and includes all countries and             global average. As has been discussed previously, with
                                                                     6                 3   Illinois                       0.55
9                                                                                                                                              U.S. states that had more than 1,000 average monthly               regard to the adoption of high broadband Internet
                                                                         8             4   massachusetts                  0.54
                                                                                       5   missouri                       0.50
                                                                                                                                               unique IP addresses make requests to Akamai’s network              connections, Asia and Northern Europe hold the majority
                                                                                       6   new Jersey                     0.47                 during the fourth quarter. For the purposes of classifi-           of the spots in the top 10, as shown in Figure 12.
                                                                2                      7   rhode Island                   0.46                 cation in this report, the “broadband” data included
        10                                                                             8   maryland                       0.46
                                                                                                                                               below is for connections greater than 2 Mbps, and                  The United States ranked 17th globally, with an average
                                                                                       9   utah                           0.44
                                                                                      10   colorado                       0.41
                                                                                                                                              “high broadband” is for connections 5 Mbps or greater.              connection speed of 3.9 Mbps, up approximately 8% from
                                                                                                                                               In contrast, the “narrowband” data included below is for           the average connection speed for the first quarter of
        Figure 11: Internet Penetration in the United States
                                                                                                                                               connections slower than 256 Kbps. Quarter-over-quarter             2008. We expect that this average speed will continue to
                                                                                                                                               and year-over-year changes are shown in an effort to               grow over time, as new technologies, such as DOCSIS 3.0
                                                                                                                                               highlight general and longer-term trends.                          (as described in Section 3.7) enable consumer broadband
                                                                                                                                                                                                                  connections to reach significantly higher speeds.
                                                                                                                                               As the quantity of HD-quality media increases over time,
                                                                                                                                               and the consumption of that media increases, end users             5.2 Average Connection Speeds, United States
                                                                                                                                               are likely to require ever-increasing amounts of band-             In December, PCMag.com published an article titled
                                                                                                                                               width. A connection speed of 2 Mbps is arguably                    “The Fastest ISPs in America — and Where You Live.”133
                                                                                                                                               sufficient for standard-definition TV-quality video con-           Leveraging their own SurfSpeed application (“a utility that
                                                                                                                                               tent, and 5 Mbps for standard-definition DVD-quality               grabs pages and page elements from several popular Web
                                                                                                                                               video content, while Blu-Ray (1080p) video content has             sites to measure actual Internet surfing speed”), PCMag
                                                                                                                                               a maximum video bit rate of 40 Mbps, according to the              collected data points from more than 17,000 unique IP
                                                                                                                                               Blu-Ray FAQ.132                                                    addresses, comprising over 200,000 individual tests, and
                                                                                                                                                                                                                  then analyzed the results to find the fastest ISPs in the
                                                                                                                                                                                                                  United States, as well as ranking each state on average
                                                                                                                                                                                                                  download speed. In addition, The Communications



        20                                      © 2009 Akamai Technologies, Inc. All Rights Reserved                                                                                    © 2009 Akamai Technologies, Inc. All Rights Reserved                              21
4th Quarter, 2008 - The State of the Internet report
4th Quarter, 2008 - The State of the Internet report
4th Quarter, 2008 - The State of the Internet report
4th Quarter, 2008 - The State of the Internet report
4th Quarter, 2008 - The State of the Internet report
4th Quarter, 2008 - The State of the Internet report
4th Quarter, 2008 - The State of the Internet report

Mais conteúdo relacionado

Mais procurados

Akamai Q1 2012 State of the Internet Report
Akamai Q1 2012 State of the Internet ReportAkamai Q1 2012 State of the Internet Report
Akamai Q1 2012 State of the Internet ReportDavid Belson
 
Akamai State of the Internet Report, Q2 2012
Akamai State of the Internet Report, Q2 2012Akamai State of the Internet Report, Q2 2012
Akamai State of the Internet Report, Q2 2012Akamai Technologies
 
Akamai State of the Internet Report, Q3 2012
Akamai State of the Internet Report, Q3 2012Akamai State of the Internet Report, Q3 2012
Akamai State of the Internet Report, Q3 2012Akamai Technologies
 
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11Retelur Marketing
 
SAMENA Response to Iraq CMC fixed wireless consultation
SAMENA Response to Iraq CMC fixed wireless consultationSAMENA Response to Iraq CMC fixed wireless consultation
SAMENA Response to Iraq CMC fixed wireless consultationroberto ercole
 

Mais procurados (7)

Akamai Q1 2012 State of the Internet Report
Akamai Q1 2012 State of the Internet ReportAkamai Q1 2012 State of the Internet Report
Akamai Q1 2012 State of the Internet Report
 
Akamai State of the Internet Report, Q2 2012
Akamai State of the Internet Report, Q2 2012Akamai State of the Internet Report, Q2 2012
Akamai State of the Internet Report, Q2 2012
 
Akamai State of the Internet Report, Q3 2012
Akamai State of the Internet Report, Q3 2012Akamai State of the Internet Report, Q3 2012
Akamai State of the Internet Report, Q3 2012
 
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11
"The State of the Internet". Primer trimestre de 2011 (Akamai) - AG11
 
SAMENA Response to Iraq CMC fixed wireless consultation
SAMENA Response to Iraq CMC fixed wireless consultationSAMENA Response to Iraq CMC fixed wireless consultation
SAMENA Response to Iraq CMC fixed wireless consultation
 
Akamai q111
Akamai q111Akamai q111
Akamai q111
 
Wireless broadband spectrum in the EU
Wireless broadband spectrum in the EUWireless broadband spectrum in the EU
Wireless broadband spectrum in the EU
 

Semelhante a 4th Quarter, 2008 - The State of the Internet report

Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008guest190b7a
 
Whitepapers Akamai State Of The Internet Q2 2008
Whitepapers Akamai State Of The Internet Q2 2008Whitepapers Akamai State Of The Internet Q2 2008
Whitepapers Akamai State Of The Internet Q2 2008guest190b7a
 
Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008JOSÉ RAMON CARIAS
 
Http Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...
Http   Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...Http   Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...
Http Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...jash222
 
Akamai - State of the Internet (Q4 2009)
Akamai - State of the Internet (Q4 2009)Akamai - State of the Internet (Q4 2009)
Akamai - State of the Internet (Q4 2009)Constantin Cocioaba
 
Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)Constantin Cocioaba
 
Akamai´s State of the Internet
Akamai´s State of the Internet Akamai´s State of the Internet
Akamai´s State of the Internet Carlos Diaz Warns
 
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the InternetAkamai Technologies
 
Akamai State of the Internet Report, Q1 2012
Akamai State of the Internet Report, Q1 2012Akamai State of the Internet Report, Q1 2012
Akamai State of the Internet Report, Q1 2012Akamai Technologies
 
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1Akamai Technologies
 
Akamai's State of the Internet
Akamai's State of the InternetAkamai's State of the Internet
Akamai's State of the InternetAlvaro Quesada
 
Akamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. ÇeyrekAkamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. ÇeyrekWebrazzi
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysShah Sheikh
 
Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012C. Keiko Funahashi
 
State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012Akamai Technologies
 
Akamai soti q213_exec_summary
Akamai soti q213_exec_summaryAkamai soti q213_exec_summary
Akamai soti q213_exec_summaryMiguel Angel
 
The State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive SummaryThe State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive SummaryAkamai Technologies
 
The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report Akamai Technologies
 
Study_Paper_akamai_network.pdf
Study_Paper_akamai_network.pdfStudy_Paper_akamai_network.pdf
Study_Paper_akamai_network.pdfZeelPatel559214
 

Semelhante a 4th Quarter, 2008 - The State of the Internet report (20)

Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008
 
Whitepapers Akamai State Of The Internet Q2 2008
Whitepapers Akamai State Of The Internet Q2 2008Whitepapers Akamai State Of The Internet Q2 2008
Whitepapers Akamai State Of The Internet Q2 2008
 
Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008Akamai state of_the_internet_q1_2008
Akamai state of_the_internet_q1_2008
 
Http Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...
Http   Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...Http   Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...
Http Www.Akamai.Com Dl Whitepapers Akamai State Of The Internet Q2 2008.Pdf...
 
Akamai - State of the Internet (Q4 2009)
Akamai - State of the Internet (Q4 2009)Akamai - State of the Internet (Q4 2009)
Akamai - State of the Internet (Q4 2009)
 
Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)Akamai - State of the internet (Q2 2010)
Akamai - State of the internet (Q2 2010)
 
Akamai´s State of the Internet
Akamai´s State of the Internet Akamai´s State of the Internet
Akamai´s State of the Internet
 
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 4 4TH QUARTER, 2013 REPORT The State of the Internet
 
Akamai State of the Internet Report, Q1 2012
Akamai State of the Internet Report, Q1 2012Akamai State of the Internet Report, Q1 2012
Akamai State of the Internet Report, Q1 2012
 
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
Akamai's State of the Internet Q1 2014 Report | Volume 7 Number 1
 
Akamai's State of the Internet
Akamai's State of the InternetAkamai's State of the Internet
Akamai's State of the Internet
 
Akamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. ÇeyrekAkamai - State of Internet Raporu 2014 1. Çeyrek
Akamai - State of Internet Raporu 2014 1. Çeyrek
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
 
Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012Reference: Akamai State of the Internet Q4 2012
Reference: Akamai State of the Internet Q4 2012
 
State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012State of the Internet Report: Q4 2012
State of the Internet Report: Q4 2012
 
Akamai soti q213_exec_summary
Akamai soti q213_exec_summaryAkamai soti q213_exec_summary
Akamai soti q213_exec_summary
 
The State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive SummaryThe State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive Summary
 
The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report The State of the Internet, 1st Quarter, 2013 Report
The State of the Internet, 1st Quarter, 2013 Report
 
The State of Internet
The State of InternetThe State of Internet
The State of Internet
 
Study_Paper_akamai_network.pdf
Study_Paper_akamai_network.pdfStudy_Paper_akamai_network.pdf
Study_Paper_akamai_network.pdf
 

Mais de Jordi Planas Manzano

Plan accesibilidad universal aprobado ce
Plan accesibilidad universal   aprobado cePlan accesibilidad universal   aprobado ce
Plan accesibilidad universal aprobado ceJordi Planas Manzano
 
Continguts pla accessibilitat - Diputació de Barcelona
Continguts pla accessibilitat - Diputació de BarcelonaContinguts pla accessibilitat - Diputació de Barcelona
Continguts pla accessibilitat - Diputació de BarcelonaJordi Planas Manzano
 
Y line by Montserrat Adell Winkler
Y line by Montserrat Adell WinklerY line by Montserrat Adell Winkler
Y line by Montserrat Adell WinklerJordi Planas Manzano
 
Análisis del top 100 de los usuarios twitter más activos de españa
Análisis del top 100 de los usuarios twitter más activos de españaAnálisis del top 100 de los usuarios twitter más activos de españa
Análisis del top 100 de los usuarios twitter más activos de españaJordi Planas Manzano
 
La véritable nature du régime de ben ali
La véritable nature du régime de ben aliLa véritable nature du régime de ben ali
La véritable nature du régime de ben aliJordi Planas Manzano
 
Tarragona impulsa: Dimarts emprenedors
Tarragona impulsa: Dimarts emprenedorsTarragona impulsa: Dimarts emprenedors
Tarragona impulsa: Dimarts emprenedorsJordi Planas Manzano
 
Financiación para inversores en emprendedores TIC
Financiación para inversores en emprendedores TICFinanciación para inversores en emprendedores TIC
Financiación para inversores en emprendedores TICJordi Planas Manzano
 
Informe de Derechos Humanos y Discapacidad 2008 del CERMI
Informe de Derechos Humanos y Discapacidad 2008 del CERMIInforme de Derechos Humanos y Discapacidad 2008 del CERMI
Informe de Derechos Humanos y Discapacidad 2008 del CERMIJordi Planas Manzano
 
Business Intelligence Now More Than Ever
Business Intelligence Now More Than EverBusiness Intelligence Now More Than Ever
Business Intelligence Now More Than EverJordi Planas Manzano
 
Ordenanza de Santurtzi donde se expropiará suelo para facilitar el acceso a l...
Ordenanza de Santurtzi donde se expropiará suelo para facilitar el acceso a l...Ordenanza de Santurtzi donde se expropiará suelo para facilitar el acceso a l...
Ordenanza de Santurtzi donde se expropiará suelo para facilitar el acceso a l...Jordi Planas Manzano
 
Joan Torrent Coneixement, Xarxes I Activitat EconòMica
Joan Torrent   Coneixement, Xarxes I Activitat EconòMicaJoan Torrent   Coneixement, Xarxes I Activitat EconòMica
Joan Torrent Coneixement, Xarxes I Activitat EconòMicaJordi Planas Manzano
 
Six Technology Tactics To Promote Corporate Social Responsibility
Six Technology Tactics To Promote Corporate Social ResponsibilitySix Technology Tactics To Promote Corporate Social Responsibility
Six Technology Tactics To Promote Corporate Social ResponsibilityJordi Planas Manzano
 

Mais de Jordi Planas Manzano (20)

Plan accesibilidad universal aprobado ce
Plan accesibilidad universal   aprobado cePlan accesibilidad universal   aprobado ce
Plan accesibilidad universal aprobado ce
 
Continguts pla accessibilitat - Diputació de Barcelona
Continguts pla accessibilitat - Diputació de BarcelonaContinguts pla accessibilitat - Diputació de Barcelona
Continguts pla accessibilitat - Diputació de Barcelona
 
Y line by Montserrat Adell Winkler
Y line by Montserrat Adell WinklerY line by Montserrat Adell Winkler
Y line by Montserrat Adell Winkler
 
Grans runes de tarragona
Grans runes de tarragonaGrans runes de tarragona
Grans runes de tarragona
 
Amagar un dèficit descomunal
Amagar un dèficit descomunalAmagar un dèficit descomunal
Amagar un dèficit descomunal
 
[OEI] Open Energy Institute
[OEI] Open Energy Institute[OEI] Open Energy Institute
[OEI] Open Energy Institute
 
Comptes municipals reus
Comptes municipals reusComptes municipals reus
Comptes municipals reus
 
Comptes municipals tarragona
Comptes municipals tarragonaComptes municipals tarragona
Comptes municipals tarragona
 
Análisis del top 100 de los usuarios twitter más activos de españa
Análisis del top 100 de los usuarios twitter más activos de españaAnálisis del top 100 de los usuarios twitter más activos de españa
Análisis del top 100 de los usuarios twitter más activos de españa
 
La véritable nature du régime de ben ali
La véritable nature du régime de ben aliLa véritable nature du régime de ben ali
La véritable nature du régime de ben ali
 
Tarragona impulsa: Dimarts emprenedors
Tarragona impulsa: Dimarts emprenedorsTarragona impulsa: Dimarts emprenedors
Tarragona impulsa: Dimarts emprenedors
 
Financiación para inversores en emprendedores TIC
Financiación para inversores en emprendedores TICFinanciación para inversores en emprendedores TIC
Financiación para inversores en emprendedores TIC
 
Informe de Derechos Humanos y Discapacidad 2008 del CERMI
Informe de Derechos Humanos y Discapacidad 2008 del CERMIInforme de Derechos Humanos y Discapacidad 2008 del CERMI
Informe de Derechos Humanos y Discapacidad 2008 del CERMI
 
Business Intelligence Now More Than Ever
Business Intelligence Now More Than EverBusiness Intelligence Now More Than Ever
Business Intelligence Now More Than Ever
 
Pres Cip Tarragona
Pres Cip TarragonaPres Cip Tarragona
Pres Cip Tarragona
 
The Art Of TeleWorking
The Art Of TeleWorkingThe Art Of TeleWorking
The Art Of TeleWorking
 
Ordenanza de Santurtzi donde se expropiará suelo para facilitar el acceso a l...
Ordenanza de Santurtzi donde se expropiará suelo para facilitar el acceso a l...Ordenanza de Santurtzi donde se expropiará suelo para facilitar el acceso a l...
Ordenanza de Santurtzi donde se expropiará suelo para facilitar el acceso a l...
 
Joan Torrent Coneixement, Xarxes I Activitat EconòMica
Joan Torrent   Coneixement, Xarxes I Activitat EconòMicaJoan Torrent   Coneixement, Xarxes I Activitat EconòMica
Joan Torrent Coneixement, Xarxes I Activitat EconòMica
 
Six Technology Tactics To Promote Corporate Social Responsibility
Six Technology Tactics To Promote Corporate Social ResponsibilitySix Technology Tactics To Promote Corporate Social Responsibility
Six Technology Tactics To Promote Corporate Social Responsibility
 
Enterprise Pbx Buyers Guide
Enterprise Pbx Buyers GuideEnterprise Pbx Buyers Guide
Enterprise Pbx Buyers Guide
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

4th Quarter, 2008 - The State of the Internet report

  • 1. Volume 1, Number 4 4th Quarter, 2008 The State of the Internet PORT RE
  • 2. Executive Summary Each quarter, Akamai will be publishing a quarterly “State of the Internet” report. This report will include data gathered from across Akamai’s global server network about attack traffic and broadband adoption, as well as trends seen in this data over time. It will also aggregate publicly available news and information about notable events seen throughout the quarter, including Denial of Service attacks, Web site hacks, and network events, including outages and new connections. During the fourth quarter of 2008, Akamai observed attack traffic originating from 193 unique countries around the world. The United States and China were the two largest attack traffic sources, accounting for over 42% of observed traffic in total. Akamai observed attack traffic targeted at more than 20,000 unique ports, with the top 10 ports seeing over 77% of the observed attack traffic. Web site hacks and Web-based exploits were regularly in the news during the quarter, as was a proof-of-concept exploit for a vulnerability in SSL, the underlying mechanism that secures financial and retail transactions, among others, across the Web. Notable network outages in the fourth quarter were due to submarine cables in the Mediterranean being severed, as well as two major Internet backbone providers de-peering their networks from one another. Notable Web site outages in the fourth quarter were attributed to increased traffic, hardware failure, and power outages. Global connectivity advanced in the fourth quarter, with the commercial launch or announcement of WiMAX and 3G broadband services in a number of countries, the launch of higher speed cable broadband services based on DOCSIS 3.0, and additional fiber-to-the- home services that will bring extremely high-speed connections to subscribers in Switzerland, Brazil, India, Spain, Italy, and Russia. Akamai observed a nearly six percent increase (from the third quarter 2008) globally in the number of unique IP addresses connecting to Akamai’s network, and a 28% increase from the end of 2007. From a global connection speed perspective, South Korea had the highest levels of “high broadband” (>5 Mbps) connectivity for the fourth consecutive quarter, and the highest average connection speed, at 15 Mbps. In the United States, Delaware also maintained its top position, with 62% of connections to Akamai occurring at 5 Mbps or greater, and the highest average connection speed in the United States, at 7.3 Mbps. Looking at observed “narrowband” (<256 Kbps) connections, Mayotte and Equatorial Guinea were the “slowest” countries, with 98% and 96% of connections to Akamai, respectively, occurring at speeds below 256 Kbps. In the United States, the District of Columbia continued to have the highest percentage of observed connections below 256 Kbps. However, this was down nearly seven percent from the prior quarter, and over 42% from the end of 2007. The “spinning globe” featured in the Akamai NOCC represents where Akamai servers are located and how much traffic they are seeing.
  • 3. Table of Contents Introduction 1: IntroductIon 3 2: SecurIty 4 Akamai’s globally distributed network of servers allows us to gather massive 2.1 Attack Traffic, Top Originating Countries 4 amounts of information on many metrics, including connection speeds, attack 2.2 Attack Traffic, Top Target Ports 5 traffic, and network connectivity/availability/latency problems, as well as user 2.3 Attack Traffic, By Day 6 behavior and traffic patterns on leading Web sites. 2.4 Distributed Denial of Services (DDoS) Attacks 8 2.5 Web Site Hacks & Web-Based Exploits 8 In the fourth quarter of 2008, observed distributed denial of service (DDoS) 2.6 TCP-Based Attacks 9 attack traffic continued to target a consistent set of ports, though it appears 2.7 McColo Shutdown 9 that some are now being targeted by a new set of network worms. In addition, 2.8 SSL Vulnerability 10 2.9 DNSSEC 10 it appears that spikes in attack traffic may be correlated with patch releases or security advisories issued by Microsoft, as hackers rush to exploit vulnerabilities 3: networkS and web SIteS: ISSueS & ImprovementS 11 3.1 Network Outages 11 before system administrators can apply software patches. 3.2 Routing Issues 12 3.3 Peering Issues 13 Two large-scale network outages occurred during the quarter, as undersea 3.4 Web Site Outages 13 cables were once again severed in the Mediterranean, and as Sprint-Nextel 3.5 Significant New Connectivity — Undersea Cables 15 de-peered their network from Cogent Communications. However, global 3.6 Significant New Connectivity — Wireless 15 connectivity continued to become more robust, with new WiMAX and 3G 3.7 Significant New Connectivity — Fixed Broadband 16 mobile broadband services being announced or launching in a number of 3.8 DNS Expansion 17 countries, and the introduction of DOCSIS 3.0 services and additional fiber- 3.9 IPv6 17 to-the-home initiatives, which are bringing higher speed connectivity to 4: Internet penetratIon 18 subscribers in multiple countries. 4.1 Unique IP Addresses Seen By Akamai 18 4.2 Internet Penetration, Global 19 In the fourth quarter, six countries connected to Akamai’s network at average 4.3 Internet Penetration, United States 20 speeds in excess of 5 Mbps, and for the year, many countries showed 5: GeoGraphy 21 significant increases in their levels of high broadband (>5 Mbps) adoption. 5.1 Average Connection Speeds, Global 21 Decreases in the percentage of narrowband (<256 Kbps) connections to 5.2 Average Connection Speeds, United States 21 Akamai were also seen both internationally and in the United States, likely due, 5.3 High Broadband Connectivity: Fastest International Countries 24 in part, to the growth in availability of, and options for, broadband connectivity. 5.4 High Broadband Connectivity: Fastest U.S. States 25 5.5 Broadband Connectivity: Fast International Countries 26 5.6 Broadband Connectivity: Fast U.S. States 27 5.7 Narrowband Connectivity: Slowest International Countries 28 5.8 Narrowband Connectivity: Slowest U.S. States 29 6: appendIX: Selected InternatIonal data 30 7: endnoteS 31 2 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved 3
  • 4. Section 2: Security Akamai maintains a distributed set of agents deployed 2.1 Attack Traffic, Top Originating Countries In December, IT security firm Sophos published1 its destined for over 20,200 unique ports. Obviously, there is across the Internet that serve to monitor attack traffic. During the fourth quarter of 2008, Akamai observed Security Threat Report 2009, which examined the security a significant “long tail” that occurs – the top 200 target Based on the data collected by these agents, Akamai attack traffic originating from 193 unique countries threat landscape over the course of 2008. The report ports only account for 73% of the observed attack traffic is able to identify the top countries from which attack around the world, up nearly 8% from the third quarter noted that the top 5 malware-hosting countries in 2008 from the United States. traffic originates, as well as the top ports targeted count of 179 countries. This quarter, the United States consisted of the United States, China (including Hong by these attacks. (Ports are network layer protocol moved into the first place slot for the first time in 2008, Kong), Russia, Germany, and South Korea. It is interest- For the third consecutive quarter, Port 445 (Microsoft- identifiers.) This section, in part, provides insight into after placing second to China or Japan throughout ing to note that these countries have also all consistently DS) held the first place spot, with a slightly higher Internet attack traffic, as observed and measured by the year. Argentina returned to the top 10 again in the been among the top 10 countries from which Akamai percentage of the overall observed traffic than in the Akamai, during the fourth quarter of 2008. While fourth quarter — it was ranked fifth for first quarter has observed attack traffic originating in during 2008. third quarter, and still below second quarter levels. This some quarter-over-quarter trending may be discussed, attack traffic. Throughout 2008, the United States, port represented over half of the attack traffic observed it is expected that both the top countries and top China, Taiwan, South Korea, and Japan were consistently 2.2 Attack Traffic, Top Target Ports from Argentina in the fourth quarter, approximately a ports will change on a quarterly basis. among the top 10 countries that generated the highest During the fourth quarter of 2008, Akamai observed quarter of the attack traffic from the United States and percentages of attack traffic. attack traffic targeted at just over 20,800 unique Russia, and around a third of observed attack traffic This section also includes information on selected ports, over eight times more than in the third quarter. coming from Taiwan, Japan, Brazil, and Germany. While DDoS attacks, Web site hacking attempts, Web-based The trend in attack traffic distribution continues to be Consistent with prior quarters, some of the attack traffic this port was previously associated with the Sasser exploits, and other attacks and events as published relatively consistent with the prior quarters, with the targeted services on well-known ports. Due to the worm, it appears that it is also2 associated with the in the media during the fourth quarter of 2008. Note top 10 countries as the source for just under 72% of significant growth in port count, the attack traffic was Gimmiv.A worm, which exploited a vulnerability3 that that Akamai does not release information on attacks observed attack traffic. (This is down slightly from prior slightly less concentrated than in prior quarters, with the was considered to be significant enough to ultimately be on specific customer sites and that selected published quarters, where the top 10 countries accounted for top 10 ports responsible for only 77% of the observed addressed by Microsoft in a patch4 released outside of reports are simply compiled here. 74-78% of observed attack traffic.) The list of countries attack traffic. (This is down from an 85% or greater their normal “Patch Tuesday” cycle. The Conficker worm within the top 10 appears to be getting more consistent, concentration during prior quarters of 2008.) While it is reported to also be using Port 445 and exploiting as observed across 2008 — the five countries listed above is unclear exactly what is accounting for the growth in this same vulnerability to spread across the Internet. appeared in the list during all four quarters, while Russia, targeted port count, data from fourth quarter monitoring The Conficker worm will be covered in more detail in Germany, and Brazil each held spots in the top 10 during shows that the United States is clearly responsible for this Akamai’s 1st Quarter, 2009 State of the Internet report. three of the four quarters in 2008. growth during the quarter, with originating attack traffic Country % Traffic Q3 08 % 7 Destination Port Use % Traffic Q3 08 % OTHER Microsoft-DS 1 united States 22.85 19.68 3 Port 2 china 19.30 26.85 445 microsoft-dS 22.96 21.12 3 Sweden 10.67 3.86 8 9 80 www 14.51 9.18 SMTP 4 taiwan 5.61 2.54 139 netbIoS 11.56 21.09 5 South korea 2.52 9.37 22 SSh 10.78 9.73 GhostSurf 6 argentina 2.51 0.39 135 microsoft-rpc 7.15 10.68 1 VNC Server 7 russia 2.33 1.94 1433 microsoft SQl Server 2.46 3.20 5 8 Germany 2.15 2.20 (multiple) WWW 8000 (multiple) 2.14 0.87 2 9 Japan 2.00 3.13 10 Microsoft 5900 vnc Server 2.07 1.93 10 brazil 1.68 2.64 6 SQL Server 7212 GhostSurf 1.93 0.74 4 – other 28.38 – 25 Smtp 1.89 2.28 Microsoft-RPC various other 22.56 – NetBIOS Figure 1: Attack Traffic, Top Originating Countries SSH Figure 2: Attack Traffic, Top Target Ports 4 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved 5
  • 5. Section 2: Security (continued) For the first time in 2008, Port 80 (WWW) moved into 2.3 Attack Traffic, By Day second place in the top 10. SQL injection attacks cont- After previous issues of Akamai’s State of the Internet inued to be a popular attack vector in the fourth quarter, report were published, it was suggested that attack traffic as noted in Section 2.5. The significant growth in obser- patterns may have a correlation with Microsoft’s “Patch ved attack traffic to this port may be due to scans looking Tuesday” updates — a so-called “Attack Wednesday” for Web servers that are vulnerable to such attacks. following the Tuesday release of patches by Microsoft, as Interestingly, Port 80 was responsible for over 93% of the attackers looked for unpatched systems in order to exploit attacks that were observed to be originating in Sweden. those specific vulnerabilities. However, looking at obser- ved attack traffic from the fourth quarter, aggregated Attacks targeted at Port 8000 also grew significantly in by day of week, it does not appear that this suggested the fourth quarter, enough to push it into the top 10 correlation necessarily holds, as is shown in Figure 3. list. Officially,5 Port 8000 is used for the “iRDMI” service, Figure 4: Attack Traffic, by Day of Quarter though it is unclear what this service is, or what it is In fact, it appears that Wednesdays accounted for the used for. However, the port is also6 reportedly used by lowest percentage of weekday traffic during the fourth peak seen on December 18 did follow an out-of-band day11 by Microsoft, warning that systems running various a number of other software packages, and is also often quarter, though still ahead of the percentage of attacks update9 issued by Microsoft that addressed a critical older versions of SQL Server were vulnerable to attack, used as an alternative default port for HTTP traffic. It is that was observed on Saturdays and Sundays. vulnerability in some versions of their Internet Explorer and the traffic seen that day has a high likelihood of not known which piece of software that binds to Port Web browser, and the near-doubling of attack traffic being attempted SQL injection attacks. 8000 was targeted by these attacks. However, looking at attack traffic by day across the seen on that day may be related to that vulnerability. In quarter, a significant increase occurred on November 19, addition, the massive spike that was seen on December Comparing the levels of attack traffic targeted at the Port 7212 also made its first appearance in the top 10 and attack traffic remained elevated throughout the rest 5 followed the posting of an “Advanced Notification”10 top three Microsoft-related ports (445, 139, and 135) during the fourth quarter. During the third quarter, this of the quarter, as shown in Figure 4. by Microsoft of the security bulletins that were going to aggregated across the fourth quarter, and charting the port was the top target port for attacks seen from China be released the following Tuesday. Again, this increase in levels by day of week, they all appear to follow a similar — in the fourth quarter, it was the third most targeted It is interesting to note that November 19 is, in fact, attack traffic may have been related to attackers rushing pattern. The number of attacks reaches the highest levels port for China-sourced attacks. Please refer to Akamai’s a Wednesday, but did not follow a “Patch Tuesday” to exploit the related vulnerabilities ahead of patches early in the week, bottoming out on Thursday, and then 3rd Quarter, 2008 State of the Internet report for release — Microsoft Security Bulletins MS08-0687 and being issued. Finally, the spike seen on December 22 can increasing again into the weekend, as shown in Figure 5. additional details on Port 7212 vulnerabilities. MS08-0698 were released a week prior. However, the likely be correlated with a security advisory issued that This traffic pattern may also be influenced by Microsoft’s 135 139 445 Sunday Monday Tuesday Wednesday Thursday Friday Saturday Figure 3: Attack Traffic, Aggregated by Day of Week Figure 5: Attack Traffic Targeting Ports 445, 139, and 135 by Day of the Week 6 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved 7
  • 6. Section 2: Security (continued) practice of releasing major patches on Tuesday — more than 4.5 million blogs) was subjected to a DDoS SQL injection once again continued to be a popular 2.6 TCP-Based Attacks vulnerabilities are exploited ahead of the patch releases, attack on October 27 that caused some of its blogs to vector for Web-based attacks during the fourth quarter. As noted above in Section 2.2, the Conficker worm and then as compromised systems are patched, attack become unavailable for a period of time. Wordpress.com Two Adobe Web sites, Vlog It and Serious Magic, were exploits services running on TCP port 445, and was iden- volume decreases. has three origin data centers and was able to reroute compromised through SQL injection in October, accord- tified as a key component in a botnet that was estimated the relevant traffic to unaffected servers once the DDoS ing to Internet security firm Sophos.20 In November, to include approximately half a million compromised 2.4 Distributed Denial of Service attack had been identified and isolated.15 security firm Kaspersky Lab discovered 1,200 Web sites systems by early December.30 The Conficker worm will (DDoS) Attacks around the world that had been compromised by an SQL be covered in more detail in Akamai’s 1st Quarter, 2009 The Internet celebrated an auspicious occasion on 2.5 Web Site Hacks & Web-Based Exploits injection attack that appeared to originate from China.21 State of the Internet report. November 2, 2008, the 20th anniversary of the “Morris In December, the Koobface virus resurfaced on Facebook. In late December, Microsoft issued a warning22 about a Worm”, arguably the first major denial of service attack The virus leverages malware unknowingly downloaded by critical bug in its SQL server software that could be 2.7 McColo Shutdown on the Internet. According to a published report,12 the users, which sends out messages to their Facebook friends, exploited by attackers. In mid-November, hosting provider McColo Corp. was worm was written by then Cornell University student urging them to click on a link that takes them to an infec- disconnected from the Internet. Identified as a major host Robert Tappan Morris, who was later convicted of com- ted Web site,16 as well as hijacking search requests made As initially described in the 3rd Quarter, 2008 State of of organizations engaged in sending unsolicited e-mail puter fraud for the incident. Morris is now an associate to popular search sites such as Google, Yahoo, and MSN. the Internet report, the Web-based attack vector known (“spamming”), it was reported that McColo had been professor of computer science at MIT. Launched on as “clickjacking” gained additional exposure during the responsible for up to 75% of all spam sent each day.31 November 2, 1988, the Morris worm disabled approxi- As discussed in the previous two issues of the State of the fourth quarter. In early October, an Israeli research mately 10% of all Internet-connected systems. The worm Internet report, cross-site scripting (XSS) continues to be released a proof-of-concept demo that highlighted the In addition to reducing spam volumes across the Internet, was a self-replicating program that exploited known a problem. In October, Yahoo fixed an XSS error in the threat posed the clickjacking flaw.23 Days later, Adobe the disconnection of McColo also served to disrupt the weaknesses in common utilities including e-mail software hotjobs.yahoo.com domain that allowed attackers to in- posted24 a workaround procedure to help mitigate “Rustock” and “Srizbi” botnets, crippling an estimated sendmail, as well as Finger, a tool that showed which ject JavaScript code into the page that silently copied the exposure, and subsequently released a Flash Player 500,000 compromised systems (“bots”).32 Although users were logged on to a given computer. cookies used to authenticate Yahoo users when they log update25 that addressed the security vulnerabilities. the Srizbi botnet control servers resurfaced at an ISP in in to sections of the site that require a password. Attack- Estonia, that ISP quickly cut off connectivity to those Several high-profile Web sites suffered DDoS attacks ers, using these cookies, then had broad control over the In October, a researcher at Aladdin Knowledge Systems servers.33 Unfortunately, the Srizbi bots gradually during the fourth quarter. The BBC Web site was subjec- victim’s Yahoo account, including Yahoo e-mail and any announced that that he had discovered a cache of user- became active again through updates to their code, and ted to a DDoS attack on November 6 that crippled the other service that uses authentication cookies belonging names and passwords for over 200,000 Web sites, it appeared that several weeks after the McColo shut- Web site’s performance significantly. During the attack, to the yahoo.com domain.17 In December, it was discovered including 80,000 that had been modified with malicious down that spam volumes were once again on the rise.34 the BBC Web site responded very slowly, and measure- that an XSS error on americanexpress.com allowed attack- content.26 According to the researcher, the 200,000 ments made by monitoring service Pingdom showed that ers to steal users’ authentication cookies, which are used compromised sites included those belonging to govern- for a total of 1 hour and 15 minutes it did not respond to validate American Express customers after they enter ments, Fortune 500 companies, universities and other at all.13 The Web site for “NO on Prop 8” (opposing their login credentials.18 However, the security hole was businesses; more than half of the affected sites belonged Proposition 8, which would eliminate same-sex couples’ closed within an hour after an article about it was posted to European companies and organizations. Other Web right to marry in California) was hit by a DDoS attack on IT news Web site The Register. Four XSS bugs on the sites hacked in the fourth quarter included those belong- that took the site down for several hours on October 29, Facebook Web site were also publicized and quickly ing to online bill payment company CheckFree,27 the with attack traffic originating from computers not just addressed in December.19 Ohio Secretary of State,28 and the World Bank.29 within California, but also from Texas, New Jersey and Georgia.14 The Wordpress.com blog platform (hosting 8 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved 9
  • 7. Section 3: Networks and Web Sites: Section 2: Security (continued) Issues & Improvements 2.8 SSL Vulnerability 2.9 DNSSEC The fourth quarter of 2008 saw another significant an alternate submarine cable through Puerto Rico.43 On December 30, it was announced at the 25th Chaos Following the DNS exploit described by Dan Kaminsky network outage in the Mediterranean, as a result of three On December 8, over a million subscribers of Time Communication Congress that researchers had found a in the third quarter, and the subsequent push for the undersea cables being severed. A peering dispute between Warner Cable saw their Internet connectivity impaired way to target a known weakness in the MD5 algorithm implementation of DNSSEC, the Internet Corporation for Sprint-Nextel and Cogent Communications effectively for approximately two-and-a-half hours due to the to create a rogue Certification Authority (CA) that would Assigned Names and Numbers (ICANN),38 VeriSign,39 and partitioned the Internet, preventing single-homed custo- failure of Time Warner’s DNS servers.44 allow them to create “fake” SSL certificates that would the United States Department of Commerce National mers of both providers from reaching one another. In still be fully trusted by all modern Web browsers.35 As of Telecommunications and Information Administration addition, a number of high profile Web sites experienced Eerily echoing events of January 2008, on the morning the time of the announcement, at least six CAs were (NTIA)40 all issued proposals regarding the cryptographic availability problems throughout the quarter due to a of December 19, three key underwater cables in the using the MD5 algorithm to sign SSL certificates, and the signature of the DNS root zone. NTIA invited interested variety of reasons, including power outages and flash Mediterranean (SeaMeWe-3, SeaMeWe-4 and FLAG) researchers estimated that 30-35% of all SSL certificates stakeholders to file comments on the proposals, and crowds. Many new WiMAX initiatives were announced, were severed, which impacted Internet traffic in the currently in use had an MD5 signature somewhere in received more than 30 comments in favor of securing which are likely to bring wireless broadband connectivity Middle East and the Indian subcontinent.45 According their authentication chain.36 the root zone. Commenters included representatives of to users in countries around the world, and new fiber-to- to measurements from Renesys, more than 1,400 of the Internet Architecture Board, the Internet Society, the-home initiatives and DOCSIS 3.0 rollouts brought Egypt’s and more than 450 of India’s globally routed Because the digital signature on the fake certificate Akamai Technologies, NeuStar, Afilias, and Comcast.41 extremely high-speed wired broadband connectivity to prefixes (networks) suffered outages, as shown in Figure appears to come from a reputable and presumably trust- users in North and South America, Asia, and Europe. 6. Repairs to the SeaMeWe-3 and SeaMeWe-4 cables worthy CA, a user’s browser will accept it and indicate to In the meantime, seven leading domain name vendors, began two days later, as the repair ship “Raymond the user that the connection is secure. Coupled with the representing more than 112 million domain names 3.1 Network Outages Croze” was dispatched by France Telecom.46 Unfortu- DNS attack described by Dan Kaminsky, users could be (65% of all registered domain names) formed the On December 4, equipment failure caused a complete nately, as France Telecom finished repairing the redirected to malicious sites without being aware of it. DNSSEC Industry Coalition to work together to drive the loss of Internet connectivity for two of the three ISPs in SeaMeWe-4 cable on December 25, the cable broke These rogue e-commerce or banking sites, for example, adoption of DNSSEC across all domain name registries Haiti that connect to the Internet through the ARCOS again in a different place, which pushed out repairs until would appear trusted, and could make the collection of and registrars around the world.42 Participants in the submarine cable. The outage lasted for approximately approximately 10 days later than originally expected.47 login or other personal data fairly simple for an attacker coalition include VeriSign (.com, .net), The Public Interest three-and-a-half hours until traffic was re-routed through without raising a user’s suspicion. Registry (.org), Nominet UK (.uk), Afilias (.info), NeuStar (.biz, .us), the Foundation for Internet Infrastructure (.se), Two days after the announcement, VeriSign announced and Educause (.edu). While the primary goal of the that they would be transitioning from the MD5 algorithm coalition is to accelerate the deployment of DNSSEC, to the SHA-1 algorithm for digital certificates they issued, the participants noted that it would be “unrealistic” to and security researchers encouraged other CAs to do set forth a timetable for deployment until the issues the same.37 surrounding signature of the DNS root zone are resolved. Figure 6: Network Outages by Country (Data courtesy of Renesys) 10 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved 11
  • 8. Section 3: Networks and Web Sites: Issues & Improvements (cont’d) A Reuters article48 noted that the three severed cables 3.2 Routing Issues 3.3 Peering Issues 3.4 Web Site Outages were the most direct route for moving traffic between On November 10, Companhia de Telecomunicacoes do On October 30, the network link between Cogent and The Web site of file sharing service Yousendit was Western Europe and the Middle East, and that Verizon Brasil Central (CTBC) inadvertently leaked a nearly-full Sprint-Nextel disappeared; from a routing perspective — unavailable for over 5 hours in total, due to four separate had rerouted some of its traffic by sending it across set of routing information to two of its upstream network Sprint de-peered Cogent. As a result, customers of outages that occurred on November 17. The shortest the Atlantic, then the United States, across the Pacific, providers, in essence hijacking most of the Internet’s Cogent lost access to networks connected to Sprint, and outage lasted 30 minutes and the longest lasted 2 hours and on to the Middle East. It is important to note that address space. The data was not generally propagated vice-versa.50 Cogent is no stranger to peering disputes, and 25 minutes.56 XCalibre Communications’ FlexiScale Akamai’s services can help customers maintain consistent to the Internet at large, though, preventing another and had been involved in at least four prior incidents over on-demand utility computing platform experienced site and application performance and availability when YouTube-like issue that occurred earlier in the year. (See the last six years — AOL in 2003, France Telecom in another big outage in late October. The outage lasted such cable cuts occur, and when alternate routes force Section 3.3 of Akamai’s 1st Quarter, 2008 State of the 2006, Level 3 in 2005 and TeliaSonera in March 2008.51 approximately 18 hours and was reportedly due to near- traffic across continents and oceans. Figure 7 illustrates Internet report for additional details on the YouTube A related post52 on the Renesys blog noted that 289 simultaneous failures in the switches that connect the the results of a performance test for a customer portal issue.) Ultimately, the leak had no significant global impact. autonomous systems (networks) are completely single- storage to the processing nodes.57 Google’s Gmail service hosted in Europe, as seen by Akamai’s AsiaPac measure- However, it did make its way to RIPE’s route collector in homed (have no connectivity to the Internet through continued to have problems in the fourth quarter, ment agents. As shown, the measurement agents saw a Sao Paolo, Brazil, where a volunteer-based route monitor- anyone else) behind Cogent, and that 214 are completely experiencing an outage starting on October 15 that significant degradation in performance when trying to ing project noticed the leaked announcement and single-homed behind Sprint. In addition, Renesys noted, lasted approximately 30 hours.58 Some additional avail- retrieve content from the origin during the two days notified subscribers via e-mail of the hijacking.49 While due to Cogent’s aggressive pricing, there are a large ability issues impacting Gmail reportedly also occurred before repairs began. However, portal performance as there was little impact to the Internet as a whole, the number of service providers that are multi-homed but on Monday, October 20.59 delivered by Akamai’s IP Application Accelerator service event served to underscore the challenges that surround that send all of their outbound traffic through Cogent by remained consistent throughout the duration of the monitoring for, and alerting on, significant route changes. default. Consequently, this de-peering prevented traffic Problems dealing with “flash crowd” traffic also caused cable cut, as Akamai is able to identify and send traffic originating from those users from reaching Sprint- outages at a number of Web sites during the fourth over alternative network paths on a real-time basis. connected users. Unsurprisingly, Sprint PCS was one of quarter. The Openoffice.org site crashed on October 14, the networks single-homed to Sprint’s network, meaning due to overwhelming demand for its new 3.0 software that users of mobile devices using Sprint’s cell phone release.60 The Europeana digital library enjoyed a high- services may have had problems connecting to Web sites profile launch on November 20, but the system was and online services connected to Cogent. swamped by an unexpected 10 million user requests per hour and crashed within 24 hours of its launch.61 The Published reports53 indicated that the peering dispute Web site for Dr. Pepper was unavailable for large parts was sourced in a disagreement over payments that Sprint of the day on November 23, as the result of a surge of claimed it was owed for ongoing traffic exchange after a traffic related to a one-day marketing promotion that peering trial that ended in September 2007 — Cogent’s promised everyone in America a free bottle of soda if executives believed that the results of the trial had the new Guns n’ Roses album was released during 2008. qualified them for settlement-free peering. However, Dr. Pepper ultimately elected to extend the offer an extra on November 2, Sprint re-enabled the connection with day and add more server capacity to handle the load.62 Cogent,54 and on December 22, Sprint and Cogent Web sites can leverage the on-demand capacity available Figure 7: Akamai Download Performance Remained Consistent Despite Cable Cut announced that they had reached a multi-year intercon- through Akamai’s site delivery services to help them nection agreement for the purposes of exchanging avoid traffic-related site downtime or the need to add Internet traffic.55 additional server capacity. 12 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved 13
  • 9. Section 3: Networks and Web Sites: Issues & Improvements (cont’d) High traffic levels and application problems combined to able for nearly three hours on November 18 while it 3.5 Significant New Connectivity — end-to-end connection — if a link is lost, the take various U.S. Postal Service Web-based services migrated to a new server facility.71 A “catastrophic” Undersea Cables communication node will store the information until offline the week of December 8. Several different online UPS failure caused a power outage on November 13 at A report published in December by telecommunications the connection is re-established. tools, including the Postal Service’s popular Click-N-Ship a Santa Clara data center operated by Quality Technology research firm Telegeography noted74 that rapid growth in service, suffered outages.63 Most tools were available Services, triggering days of performance problems for Internet capacity around the world over the last decade Closer to Earth, O3b Networks continues to sign contracts again by Monday afternoon, but the Click-N-Ship service the social network Friendster. Although the hosting has led to a diminished role for the United States as an to bring Internet connectivity to remote regions using was not fully functional again until Friday, December 12.64 facility was back on generator power within two hours, Internet hub, with dramatic shifts in the amount of traffic satellites in equatorial orbit. In December 2008, O3b Friendster remained offline for more than 23 hours over that passes through the United States from other conti- announced that Afghani telco Neda Telecommunications A number of social networking and related sites a three day period.72 nents. Telegeography found that in 1999, 91% of data will deploy its Quick Start service as a means for connect- experienced varying amounts of downtime in the fourth from Asia passed through the United States at some ing to the Internet, though service activation is not quarter. The blog search engine Technorati experienced Looking back across all of 2008, Pingdom published73 point on its journey, but by 2008, that had fallen to just expected until late 2010.77 In Libya, users working or both downtime and slower performance for more than a report entitled “Social Network Downtime in 2008,” 54%. In 1999, 70% of data from Africa passed through located in remote areas now have access to satellite- nine hours on December 12 and 13.65 Dating website which analyzed the Web site availability (uptime) of 15 the United States, but by 2008, that number decreased based connectivity through portable satellite broadband Match.com experienced technical difficulties and was of the world’s largest social networks. Pingdom noted to just 6%. One key reason for this decline has been terminals, with speeds up to 444 Kbps.78 Finally, in Dec- unavailable for more than an hour and a half on October that Facebook and MySpace, the two largest social the growth in inter-regional connectivity made possible ember, California-based Viasat announced a plan to put 29.66 Business networking site LinkedIn was down for networks monitored, both had very little downtime in by numerous submarine cable projects, including those a broadband Internet satellite into orbit above the U.S. over an hour on October 10,67 and experienced an 2008. Only four social networks that were monitored for covered in previous editions of Akamai’s quarterly in the first half of 2011.79 According to Viasat, the sat- additional hour-long outage on November 16.68 Hosted the full year achieved overall uptime of 99.9% or better: State of the Internet reports. ellite will have an overall throughput of 100 Gbps, which blogging service Typepad was down for an hour on Facebook (99.92%), MySpace (99.94%), Classmates.com it claims should enable it to support 2 Mbps service to October 3,69 and micro-blogging service Twitter exper- (99.95%), and Xanga (99.95%). Figure 8 illustrates the In the Middle East, the Cyprus Telecommunications approximately 2 million subscribers when operational. ienced a brief outage on November 13, lasting just under aggregate downtime (in hours) that Pingdom observed Authority (Cyta) and the Syrian Telecommunication Viasat’s plans parallel an effort by Eutelsat in Europe an hour, due to a DNS configuration error.70 Popular for the social networks that it was monitoring. Establishment (STE) have agreed75 to upgrade the to launch a high capacity broadband satellite in 2010. blogging/social networking site LiveJournal was unavail- UGARIT submarine cable link between Tartous in Syria and Pentaskhinos in Cyprus in order to increase Internet Akamai’s 3rd Quarter, 2008 State of the Internet report capacity between the two countries. The 239km UGARIT noted that Sprint-Nextel had launched the “Xohm”- cable began operations in 1995, and its transmission branded WiMAX service in Baltimore, Maryland. During capacity is limited to 622 Mbps, which is also driving the the fourth quarter, Sprint-Nextel completed the two companies to initiate feasibility studies for establish- formation of a WiMAX joint venture with Clearwire, ing a second submarine link between their countries. and re-branded the service as “Clear”.80 The first city expected to get the new “Clear” WiMAX service is 3.6 Significant New Connectivity — Wireless Portland, Oregon in early January 2009.81 Representing possibly the extreme in “wireless” Internet connections, in November 2008, NASA reported the first Internationally, announcements of new WiMAX networks successful tests of its Deep Space Network, which is surged in the fourth quarter of 2008. During the quarter, modeled after the Earth-bound Internet.76 The Deep Telegeography’s CommsUpdate daily briefings82 highlight- Space Network relies upon Disruption-Tolerant ed announcements of new or expanded WiMAX networks Figure 8: Social Network Downtime in 2008, in hours (Data courtesy of Pingdom) Networking (DTN) that does not assume a continuous in Australia,83 Bahrain,84 Barbados,85 Bermuda,86 Brazil,87 14 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved 15
  • 10. Section 3: Networks and Web Sites: Issues & Improvements (cont’d) Cameroon,88 Iraq,89 Italy,90 Jordan,91 Kenya,92,93 Malaysia,94 Foundation whitepaper116 published in November. the government called on telecommunications However, by the end of the comment period in mid- Montenegro,95 Netherlands,96 Pakistan,97 Romania,98 According to the paper, the idea is that “Consumers providers119 to offer broadband services across all its December, the United States Department of Commerce, South Africa,99 Spain,100 and Sri Lanka.101 may one day purchase and own fiber connections that territory for a maximum of €35 ($45.15) a month. This the Australian government, members of the global bus- run from their homes. They would then be able to makes France the first country in the European Union iness community, and over 200 commenters on the posted Telegeography also highlighted the launch of 3G-based connect to a variety of service providers, including today’s to effectively mandate the supply of broadband services. proposal expressed significant opposition to ICANN’s plan, mobile broadband services in Canada,102 Japan,103 the Internet, television, and telephone services, as well as France Telecom and SFR plan to include broadband urging them to “go back to the drawing board and United Kingdom,104 and Uzbekistan.105 ultra-bandwidth intensive services of the future.” The among their universal services by the end of 2009. propose a process that results in a responsible expansion paper’s authors also propose that the fiber would form of the name space, not merely a duplication of it.” 124 3.7 Significant New Connectivity — part of the property right in the home. However, they In the United States, an economic stimulus bill signed in Fixed Broadband note that no market for consumer purchase of fiber February 2009 reportedly provides $7.2 billion devoted 3.9 IPv6 The launch of DOCSIS 3.0 is enabling cable providers currently exists, but they are looking at one trial that is to broadband funding, aimed at creating incentives for According to published reports, the adoption of IPv6 to roll out higher-speed connectivity options to their already ongoing in Ottawa, Canada as a means to test additional infrastructure buildout and the development continued a slow, steady growth into the end of 2008. customers, with Comcast106 announcing availability of their model’s feasibility and identify associated challenges of a comprehensive national broadband plan by the A blog post125 at Internet infrastructure news & opinion service tiers up to 50 Mbps in multiple cities across the and insights. FCC.120 This “broadband stimulus” will be examined in site CircleID notes that at the end of the year, 4% of United States; Virgin Media107 in the United Kingdom more detail in Akamai’s 1st Quarter, 2009 State of the autonomous systems on the Internet supported IPv6, launching a 50 Mbps service; and UPC Netherlands108 Also in Canada, the Saskatchewan government Internet report. up from 2.4% at the beginning of 2008. In addition, offering access at speeds of 60-120 Mbps. announced in late November that they aim to have the Number Resource Organization (NRO), which is made 100% broadband coverage across the Canadian territory 3.8 DNS Expansion up of the five Regional Internet Registries (RIRs), announ- A number of announcements were also made regarding within three years under a new CAD $129 million According to the Domain Name Industry Brief report ced126 in early December that the rate of new entrants fiber-to-the-home (FTTH) initiatives in several countries. infrastructure rollout plan. Regional incumbent telecom published121 by VeriSign, 2008 ended with a total of into the IPv6 routing system has increased by approx- In Switzerland, Swisscom began to connect households SaskTel’s fixed broadband network footprint will be 177 million domain name registrations across all of the imately 300 percent over the past two years. Additional to the neighborhood fiber-optic nodes they had pre- expanded to cover 100% of the population, up from Top Level Domains (TLDs), representing 16% growth IPv6 statistics presented at the RIPE 57 meeting in viously deployed.109 In an interesting move, Swisscom will 86% coverage today, through an expansion of the over the previous year and 2% growth over the third October were highlighted in another127 CircleID blog be laying several fibers per household to enable invited existing CommunityNet high speed network, upgraded quarter of 2008. More than 10.1 million new domain post, including data on IPv6 traffic by country, OS partners in the telecommunications, cable, and utilities rural backbone infrastructure, and a partnership with a names were registered across all of the TLDs in the fourth support, access methods, and IPv6-related latency. industries to expand their own fiber-optic infrastructure. satellite firm in order to provide access to the most quarter of 2008, reflecting slower growth in new regis- One fiber will be used by Swisscom, while the others will remote areas.117 trations, with a decline of 12% from the third quarter. However, research presented at the Proceedings of the be made available to the potential partners. In November, ACM Internet Measurement Conference, based on what Netherlands telco KPN and FTTH operator Reggefiber Similarly, in November, Finland’s government said118 that As highlighted in the 2nd Quarter, 2008 State of the the researchers claim is “the first complete census of the said that they are planning to roll out a FTTH network it will invest up to €66 million ($85.2 million) as part of Internet report, in October, ICANN published a draft Internet in more than two decades”, discovered a surpri- that could cost as much as 7 billion euros that is planned plans to increase high speed broadband coverage across “Applicant Guidebook” for new generic TLDs, and posted sing number of unused IPv4 addresses and concluded to cover pretty much every part of the Netherlands.110 the country. The investment is part of an effort to it online for review and comment.122 According that many will still be unused in two years when IPv4 Additional FTTH service announcements were made by increase access to 100 Mbps connectivity in Finland to to published reports,123 ICANN would charge groups address space was projected to be exhausted.128 “There Brasil Telecom (Brazil),111 MTNL (India),112 Telefonica 100% of the population by 2016. The expectation is that $185,000 to apply for a generic TLD, with most of the are huge chunks of IP space which are not allocated yet, (Spain),113 Telecom Italia (Italy),114 and TTK (Russia).115 by 2015, approximately 95% of the population will have money going toward evaluation of the application. and also giant swaths which are inefficiently allocated,” access to the higher broadband speeds through commer- ICANN’s plan would open up TLDs to non-English the researchers noted. Also in the fourth quarter, the notion of “homes with cial development, and by 2010 all broadband users are character sets, and seeks to streamline a TLD-creation tails” began to take root, popularized in a New America expected to be able to receive at least 1 Mbps. In France, process that has proven cumbersome in the past. 16 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved 17
  • 11. Section 4: Internet Penetration 4.1 Unique IP Addresses Seen By Akamai Growth among countries in the Top 10 slowed 4.2 Internet Penetration, Global Through a globally-deployed server network, and by quarter-over-quarter — in the third quarter, three How does the number of unique IP addresses seen 1 5 virtue of the billions of requests for Web content that countries in the Top 10 saw double digit percentage by Akamai compare to the population of each of it services on a daily basis, Akamai has unique visibility increases, while in the fourth quarter, China was those countries? Asked another way, what is the level 2 4 into the levels of Internet penetration around the world. the big gainer at just under seven percent quarterly of Internet penetration in each of those countries? In the fourth quarter of 2008, over 400 million unique growth in unique IPs seen by Akamai’s network. South Using 2008 global population data129 from the United 6 7 8 10 IP addresses connected to the Akamai network — Korea also appears to be establishing a quarterly pattern States Census Web site as a baseline, levels of Internet almost six percent more than in the third quarter, and of growth and loss — the country recorded quarterly penetration for each country around the world were 3 9 over 28 percent more than the same quarter a year increases in the first and third quarters of 2008, and calculated based on Akamai’s view into Internet traffic. ago. Similar to the prior two quarters, nearly 30% of quarterly losses in the second and fourth quarters The countries in the Top 10 list shown in Figure 10 were those IP addresses came from the United States and of 2008. For the year, however, South Korea was up stable from quarter-to-quarter, although there was some Country Unique IP’s approximately 10% came from China. over 10%, adding approximately 1.5 million unique IP shifting of positions, as Finland, Iceland, the Cayman Per Capita addresses seen by Akamai. Islands, and the British Virgin Islands were all ahead - Global 0.08 Country Q4 08 Q4-Q3 YoY of where they were ranked in the third quarter. Globally, 1 Sweden 0.46 Unique IP’s Change Change On a global basis, year-over-year, Akamai saw the number the number of unique IP’s per capita grew from 0.06 2 norway 0.42 - Global 401,285,817 +5.67% +28.38% of unique IP addresses more than double in 19 countries in the third quarter (and 0.05 in the first quarter) to 3 cayman Islands 0.40 1 united States 114,123,038 +4.38% +24.13% 4 Finland 0.39 — Turks and Caicos led the list with 695% growth. 0.08 at the end of 2008. 2 china 40,130,543 +6.75% +33.08% 5 Iceland 0.39 3 Japan 27,659,076 +0.53% +13.98% (To be fair, this statistic is also influenced by the law 6 united States 0.38 4 Germany 27,361,610 +5.69% +35.93% of small numbers, as they ended 2008 with just under These per capita figures should be considered as an 7 netherlands 0.36 5 France 18,583,433 +4.31% +16.82% 2,400 unique IP addresses seen by Akamai.) Sixteen approximation, as the population figures used to 8 denmark 0.36 6 united kingdom 17,781,997 +2.76% +19.04% 9 british virgin Islands 0.35 countries had a net loss year-over-year in the number of calculate them are static estimates — obviously, they 7 South korea 14,606,042 -1.68% +10.62% 10 bermuda 0.34 8 canada 10,467,353 +1.64% +11.24% unique IP addresses seen by Akamai — most are smaller will change over time, and it would be nearly impossible African nations, remote island nations in the Pacific Figure 10: Global Internet Penetration 9 Spain 9,496,698 +5.64% +20.83% to obtain exact numbers on a quarterly basis. In addi- 10 brazil 8,935,698 +1.80% +38.17% Ocean, or countries in the midst of ongoing civil unrest. tion, individual users can have multiple IP addresses (handheld, personal/home system, business laptop, etc.). Looking at the “long tail,” there were 187 countries with Furthermore, in some cases, multiple individuals may be 6 fewer than 1 million unique IP addresses connecting to represented by a single IP address (or small number of 3 Akamai in the fourth quarter of 2008, 146 with under IP addresses), as they access the World Wide Web 8 4 5 100,000 unique IP addresses, and 38 with fewer than through a firewall proxy server. Akamai believes that it 1 1,000 unique IP addresses. As compared to the prior two sees approximately 1 billion users per day, though we 9 7 quarters, these country counts remained extremely stable. see only approximately 400 million unique IP addresses. 2 10 Figure 9: Unique IP Addresses Seen By Akamai 18 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved 19
  • 12. Section 4: Internet Penetration (cont’d) Section 5: Geography 4.3 Internet Penetration, United States As shown in Figure 11, many states experienced Through its globally deployed server network and by 5.1 Average Connection Speeds, Global For the second consecutive quarter, Akamai is examining moderate increases in Internet penetration quarter-over- virtue of the billions of requests for Web content that it This quarter, the State of the Internet report will begin the level of Internet penetration within the United quarter, while it appears that Virginia and New Jersey services on a daily basis, Akamai has a unique level of vis- tracking average connection speeds for countries around States. Using state population estimates available from appear to have experienced significant decreases. It is ibility into the connection speeds of those systems issuing the world. While quarterly variances are likely, we expect the United States Census Web site,130 and the number not clear whether this is the beginning of a longer-term the requests, and as such, of broadband adoption around that over the long term, the overall trend will be towards of unique IP addresses from each state that Akamai trend for these states, or just a one-time anomaly. Future the globe. Because Akamai has implemented a distributed higher average connection speeds as levels of broadband saw during the fourth quarter, we calculated the levels editions of this report will continue examine ongoing network model, deploying servers within edge networks, adoption continue to grow. Current highlights and his- of Internet penetration on a state-by-state basis. The trends in levels of Internet penetration. it can deliver content more reliably and more consistently torical trends for average connection speeds on a global same caveats noted immediately above in section 4.2, at those speeds, in contrast to centralized competitors basis can be found in Akamai’s new data visualization regarding per capita figures as an approximation, that rely on fewer deployments in large data centers. tool, available at http://www.akamai.com/dv5. apply here as well. For more information on why this is possible, please see Akamai’s How Will The Internet Scale? white paper.131 Globally, the average connection speed was approximately State Unique IP’s 1.5 Mbps — the speed of a T-1 Internet connection. 1 5 3 Per Capita The data presented below was collected during the Looking at the top 10 globally, South Korea ranks first 4 1 washington 0.61 fourth quarter of 2008 through Akamai’s globally- with average connection speed of 15 Mbps — 10x the 7 2 Georgia 0.59 deployed server network and includes all countries and global average. As has been discussed previously, with 6 3 Illinois 0.55 9 U.S. states that had more than 1,000 average monthly regard to the adoption of high broadband Internet 8 4 massachusetts 0.54 5 missouri 0.50 unique IP addresses make requests to Akamai’s network connections, Asia and Northern Europe hold the majority 6 new Jersey 0.47 during the fourth quarter. For the purposes of classifi- of the spots in the top 10, as shown in Figure 12. 2 7 rhode Island 0.46 cation in this report, the “broadband” data included 10 8 maryland 0.46 below is for connections greater than 2 Mbps, and The United States ranked 17th globally, with an average 9 utah 0.44 10 colorado 0.41 “high broadband” is for connections 5 Mbps or greater. connection speed of 3.9 Mbps, up approximately 8% from In contrast, the “narrowband” data included below is for the average connection speed for the first quarter of Figure 11: Internet Penetration in the United States connections slower than 256 Kbps. Quarter-over-quarter 2008. We expect that this average speed will continue to and year-over-year changes are shown in an effort to grow over time, as new technologies, such as DOCSIS 3.0 highlight general and longer-term trends. (as described in Section 3.7) enable consumer broadband connections to reach significantly higher speeds. As the quantity of HD-quality media increases over time, and the consumption of that media increases, end users 5.2 Average Connection Speeds, United States are likely to require ever-increasing amounts of band- In December, PCMag.com published an article titled width. A connection speed of 2 Mbps is arguably “The Fastest ISPs in America — and Where You Live.”133 sufficient for standard-definition TV-quality video con- Leveraging their own SurfSpeed application (“a utility that tent, and 5 Mbps for standard-definition DVD-quality grabs pages and page elements from several popular Web video content, while Blu-Ray (1080p) video content has sites to measure actual Internet surfing speed”), PCMag a maximum video bit rate of 40 Mbps, according to the collected data points from more than 17,000 unique IP Blu-Ray FAQ.132 addresses, comprising over 200,000 individual tests, and then analyzed the results to find the fastest ISPs in the United States, as well as ranking each state on average download speed. In addition, The Communications 20 © 2009 Akamai Technologies, Inc. All Rights Reserved © 2009 Akamai Technologies, Inc. All Rights Reserved 21