Black + White = Grey Ethical Issues Surrounding the Creation and Distribution of Hacker Tools Used in Distributed Denial of Service Attacks Joseph Levine.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

ETHICAL HACKING.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Vulnerabilities of Windows XP Brock Prince Dana Zottola ECE 578 Spring 2002 C.K. Koc.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
1 Telstra in Confidence Managing Security for our Mobile Technology.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
1 Securing the Net: Where the Holes Are Steven M. Bellovin AT&T Labs – Research
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Introduction to Computer Ethics
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Ethics of Distributed DoS (Why TFN is Evil) March 2, 2000 Mintcho Petkov Dartmouth College.
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
GORAN OSIM AND TIM MYERS CPSC 424 DDOS AND THE SYSADMIN.
CSCE 522 Secure Software Development Best Practices.
Legitimate Vulnerability Markets By: Jeff Wheeler.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Investigating Sophisticated Security Breaches Digital Forensics has proven tough in the age of sophisticated Intruders.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Advanced Anti-Virus Techniques
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Computer and Network Security Brendan Duncombe Bahein Maung.
Full Disclosure: Is It Beneficial? Project Based Information Systems Tim Schultz 12/02/02.
Exploitation Development and Implementation PRESENTER: BRADLEY GREEN.
Zero Day Attacks Jason Kephart. Purpose The purpose of this presentation is to describe Zero-Day attacks, stress the danger they pose for computer security.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
Servers in the Wild… …and the threats that lurk about. DePaul University Information Security Team TLT Presentation 08 May 2002.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Seminar On Ethical Hacking Submitted To: Submitted By:
Hardware Protection Against Software Piracy
Software Security Testing
Threats to computers Andrew Cormack UKERNA.
Outline Introduction Characteristics of intrusion detection systems
The Cyber Threats Landscape
Ethical Hacking.
Test 3 review FTP & Cybersecurity
Challenges Of Network Security
Presentation transcript:

Black + White = Grey Ethical Issues Surrounding the Creation and Distribution of Hacker Tools Used in Distributed Denial of Service Attacks Joseph Levine February 29, 2000

Background Mid-1999 distributed DOS software begins to appear in public hacking & security forums August 17, 1999 University of Minnesota attacked by a network of hundreds of systems running Trinoo (aka Trin00) November CERT hosts workshop for 30 top security experts on “Distributed-Systems Intruder Tools” February 7, 2000 Yahoo effectively taken offline by distributed denial of service attack

Why DDOS Is Different Security exploits are published daily. Most security problems relate to a specific issue that can be corrected by vendors. Denial of service vulnerabilities are hard to eliminate.

Why DDOS Is Different Distributed denial of service attacks are even more difficult to address. Determining the true source of a distributed attack is very complicated, meaning that attacks may take longer to stop and attacker are more difficult to catch.

Common Tools

Basics of A DDOS Attack

Where Do These Tools Come From? Underground Networks of sophisticated hackers write tools like the ones being discussed here. Some are released to the public by individuals who claim to desire only to allow people to protect themselves. Once source code is available many more people can create their own variants making detection more difficult

What Benefits Do Distributed Denial of Service Tools Provide? Increased general awareness of security issues Security Analysts can review source code to learn more about the exploit Authors gain respect amongst their peers

What Problems Do These Tools Present? Lowers the minimum skill level required to execute a distributed attack Decreases the amount of effort required to execute a distributed attack Availability of source code for these tools allows them to evolve rapidly

Who is responsible? Anyone who uses these tools is clearly responsible for their own actions Authors of these tools are at fault as well. By providing a simple tool kit to commit crimes they are morally responsible for the crimes being committed.

Conclusion Creating distributed attack tools like Tribal Flood Network is ethically wrong. Researching vulnerabilities fine, as is writing reports detailing problems. Releasing functional code or binaries that have no use other than harming others is ethically wrong.

Questions