Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.

Slides:



Advertisements
Similar presentations
Economic Incentives to Increase Security in the Internet: the Case for Insurance Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) IEEE INFOCOM, Rio 2009.
Advertisements

BY MICHAEL SUDKOVITCH AND DAVID ROITMAN UNDER THE GUIDANCE OF DR. GABI NAKIBLY OSPF Security project: Summary.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ICT Ethics 2 ICT 139.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
Vote Hacking Kenny Denmark - October For an upcoming election, Washington D.C. was preparing a system to allow some voters to send in their ballots.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Threat of Cyber War The Issue of Cyber Security.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Introducing Computer and Network Security
Feedback Based Routing Offense by: Ted Merchant and Kevin Tan.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Remedy, a BMC Software company Change Management Maximize Speed and Minimize Risk in the Change Process.
Economic Systems.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
What is Smart Grid/Metering for electric distribution? Should they be implemented in the US? Presented by: Jeffrey Grodzki, April Romanishan, Cameron Hinkel,
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Chapter 3 MEASURING RISK Decisions in life ruled by Risk and Cost Take Hwy at 70 or side road at 35? How likely will someone or something be hurt? How.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
The Corporation and Public Policy: Expanding Responsibilities
Anderson School of Management University of New Mexico.
“Building a Smarter Forest” -Joe Otis. Summary Several computer scientists are testing a thesis involving the use of robots in forests in order to help.
 a crime committed on a computer network, esp. the Internet.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Jessica Lavoie CSC 101 November 27, Societal Topics Weeks 7 and 8 Internet Regulation Internet regulation is restricting or controlling access to.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
CPT 123 Internet Skills Class Notes Internet Security Session A.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
How to Sell T-Link TL250/300. T-Link Internet & Network Alarm Communicators Internet alarm communications for multi-branch Financial Institutions, Governments,
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Computer Viruses By: Eyad Al-Hazmi. Roadmap Introduction : Computer Viruses in brief Danger of Virus attacks Virus Attacks and Ethics Economic Impact.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
The Implementation of BPR Pertemuan 9 Matakuliah: M0734-Business Process Reenginering Tahun: 2010.
Computer Security By Duncan Hall.
Security Mindset Lesson Introduction Why is cyber security important?
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
1 Meeting the Challenges of Today’s Dynamic Business Environment Chapter 1.
Net Neutrality Andrey Gavel. Summary Charge more/less for certain content online Arguments for: o More users = heavy burden o Charge more for heavy traffic.
UN vs the Internet Summary
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Network Security Analysis Name : Waleed Al-Rumaih ID :
Chapter 17 Risks, Security and Disaster Recovery
CSCE 390 Professional Issues in Computer Science and Engineering Ch
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
“The-best-of-2-worlds philosophy: developing local dismantling and global infrastructure network for sustainable e-waste treatment in emerging economies”
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Presentation transcript:

Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011

Summary Max Schuchard at the University of Minnesota and his colleagues have created a digital weapon that exploit weaknesses in the internets defenses. This attack exploits the fact that the Internet structures itself to route around disabled connection points, using the border gateway protocol. It uses a directed ZMW attack between computers in a botnet to surgically disable key points. This will cause routers to send out BGP updates to neighbors in order to reroute traffic. Then the key point comes back online and reunites, which causes those two routers to send out BGP updates. This causes attack traffic to begin again, and they shut down. This cycle repeats, sending out waves of BGP information to every router on the internet. Eventually, every router in the world would be receiving more updates than it can receive. After about 20 minutes of attacking, a queue requiring 100 minutes to sift through would have built up. With every router occupied, natural routing outages won’t be fixed, and the internet would become so sundered that communication would be difficult, if not impossible. Only current recovery method is shutting down each autonomous system and rebooting it to clear the BGP backlog. Purpose of creating this weapon is to force hardening of internet infrastructure.

Summary Cont’d Don’t panic: Any malicious hacker with a botnet large enough to execute this attack is most likely renting it out for profit. Used as a last-ditch retaliation in a full-blown cyberwar. A country could adjust its BGP to disconnect from the internet (as in Egypt). Then an agent outside the country would execute this attack, bringing down the internet while the offensive nations internal network remains undamaged. Once the attack has been launched, there is little to do to stop it with current systems. Solutions include creating a “shadow internet” allowing BGP systems to issue updates to one another, clearing up bogged-down queues, or to modify the BGP system to assume links never go down. If this solution is implemented, it would need to be made to approximately 10% of all autonomous systems, and operators would have to monitor network health using other means.

8-Step Ethical Process 1) Identify question being discussed. – Cyberweapon is capable of disabling Internet by exploiting flaws in the current network systems. These flaws are correctable. 2) List stakeholders. – The stakeholders include everyone using the internet, and the independent operators of autonomous systems. Global internet users would likely benefit from having these flaws fixed in the event of an attack. Independent Operators would lose time and money switching their systems to newer protocols, but would benefit in the long term by not having downtime in the event of an attack. 3) Propose solutions – A) Ignore the problem. – B) Force every independent operator to alter their BGP system – C) Convince a percentage of independent operators to alter their BGP systems. <- Optimum solution 4) Are you willing for everyone to use solution from 3? – Yes. It benefits everyone with the least amount of associated cost. 5) Is the solution in accord with what is natural and is a balanced approach? – It is a balanced approach. See question 4. 6) Would there be majority agreement that this solution is most efficient? Will it produce the greatest good for the greatest number of people? – I would argue that this inconveniences the least amount of independent operators, while hardening our internet infrastructure against potential attack, which benefits everybody. 7) Is this solution the one you feel most committed to in conscience, regardless of personal benefit? Was this conclusion reached independently, as the arbiter of the good, free from other influence? – Yes and yes. 8) Which philosophy influenced the solution and why? – Pragmatism. The use of this system is currently hypothetical, but the loss of the internet would cause hundreds of billions of dollars in lost revenue. Convincing a percentage of operators to fix their infrastructure diminishes the possibility of this most efficiently, and is therefore, a good solution.

ACM Code The Code would direct us to act to remedy this problem under: – 1.1 Contribute to Society and human well-being Having the internet has benefitted our society, and has become integrated into almost every aspect of our economy. As such, it should be free and protected from malicious attacks. – 1.2 Avoid Harm to Others Fixing this problem would avoid potential consequences involving loss of communication and economic damage to a large spectrum of the global population. – 2.5 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks. It’s a network operators responsibility to ensure that their product is as invulnerable to attack as possible. By ignoring these risks, they let down their consumers.