SlideShare a Scribd company logo
1 of 19
Download to read offline
The New Front Line
An observation of cyber threats in the 21st century




              Jonathan Francis Roscoe
                <jjr6@aber.ac.uk>




                     November 4t 2010
Outline
Introduction
Malice in Wonderland
Cyber Warriors
Worms
Denial of Service Attacks
The Estonian Cyberassault
Stuxnet
Defensive Measures
The Future
Conclusions
2 of 19
The New Front Line:
Estonia under cyberassault
ā€¢ IEEE Security & Privacy July/August 2007 (vol. 5 no. 4)
ā€¢ Overviews a Distributed Denial of Service attack on Estonia,
  hypothesises perpetrators, mechanisms and even cost
ā€¢ Michael Lesk of Rutgers University
       Wrote a number of Unix utilities - lex, uucp and the
       predecessor to stdio Involved with a number of
       information systems Apparently only recent contributions




3 of 19
Malice in Wonderland
There are a variety of software threats for machines connected to
a network.
 ā€¢ Worms
 ā€¢ Viruses
 ā€¢ Trojans
 ā€¢ Rootkits
 ā€¢ Other malware
But threats may come from software not created with malicious
intent..


4 of 19
Cyber Warriors - Who
ā€¢ Academics
ā€¢ Malicious programmers & ā€Script Kiddiesā€
ā€¢ Spammers
ā€¢ Disgruntled employees
ā€¢ Hacktivists
ā€¢ Military groups




5 of 19
Cyber Warfare - Why
The why depends on the who..
ā€¢ Research
ā€¢ Mischief
ā€¢ Corporate espionage
ā€¢ Money
ā€¢ Political statements
ā€¢ Terrorism




6 of 19
Worms
A computer program that self-replicates over a computer
network.
ā€¢ 1988 - The Morris Worm - intended to guage the size of the
  Internet
ā€¢ 1999 - ILOVEYOU - simple VBS script that used Outlook to
  propagate
ā€¢ 2003 - SQL Slammer - slowed general Internet traļ¬ƒc,
  targetted a buļ¬€er overļ¬‚ow in MS SQL
ā€¢ 2010 - Stuxnet - attacks a speciļ¬c industrial PLC system from
  Siemens


7 of 19
Worms - How
ā€¢ Install
   ā—¦ Backdoor
   ā—¦ Ideally unnoticed
ā€¢ Propagate
   ā—¦ Counterfeit/bogus software
   ā—¦ Software exploits
   ā—¦ Email attachments




8 of 19
Botnets
ā€¢ A collection of infected hosts running autonomous software
    that can repond to commands
ā€¢   Worms designed to contact and respond to an owner
ā€¢   Geographically dispersed
ā€¢   Used for Denial of Service attacks, Spamming, Proxying,
    Dialing
ā€¢   Software is easy to obtain and modify
ā€¢   Often ā€warā€ between owners for control of susceptible
    machines
ā€¢   Up to a quarter of personal computers may be a part of a
    botnet (BBC)
9 of 19
Botnets




           Illustration of a Distributed Denial of Service attack performed with a botnet.

10 of 19
Botnets




           A graph counting all the known command and control networks by the Shadowserver Foundation

11 of 19
Denial of Service
An extremely common form of general attack. Often use botnets.
ā€¢ Type
  ā—¦ Distributed
  ā—¦ Flood - ICMP, SYN, Smurf
  ā—¦ Teardrop
  ā—¦ Peer-to-peer& multicast
  ā—¦ Application ļ¬‚ood
  ā—¦ Phlashing
ā€¢ Motive
  ā—¦ Personal
  ā—¦ Business
  ā—¦ Political and Tactical
12 of 19
Denial of Service Attacks




           Summary of DoS attack methods, from http://atlas.arbor.net/summary/dos




13 of 19
The Estonian Cyberassault
ā€¢ Stong technological society
ā€¢ Followed protests in which one person was killed and several
  injured
ā€¢ Attack not large, but target was small
ā€¢ Estonia closed itself oļ¬€ from the wider Internet
ā€¢ General consensus is that it was not a military attack, due to
  the style




14 of 19
Stuxnet
An unusually sophisticated worm.
ā€¢ Utilises zero-day exploits in Windows
ā€¢ Fradulent authentication certiļ¬cates
ā€¢ Seeks out Programmable Logic Controllers (speciļ¬cally
  Siemens) - industrial controllers for electromechanical devices
ā€¢ Speculation that it was targeted at nuclear assets
ā€¢ Majority of infection in Iran (Symantec)
ā€¢ Uses ļ¬ngerprinting, apparently to target a speciļ¬c system
ā€¢ Designed to cause catastrophic physical failure
ā€¢ ā€..mischief or ļ¬nancial reward wasnā€™t its purpose, it was aimed
  right at the heart of a critical infrastructure.ā€ - Lumension IT
  Security
15 of 19
Defensive Measures
ā€¢ Common sense & Awareness
  ā—¦ Software updates
  ā—¦ Physical access
  ā—¦ Data authentication
ā€¢ Using open source platforms
ā€¢ Antivirus
ā€¢ Firewalls & Routers
ā€¢ Intrusion Detection Systems (IDS)




16 of 19
The Future
ā€¢ Attacks can be economically and tactically signiļ¬cant to an
  entire nation.. and the world?..
ā€¢ Attacks will get more speciļ¬c - there are many kinds of
  embedded system and many of them are turning into
  fully-ļ¬‚edged computers
ā€¢ Continuingly increasing awareness and security will force novel
  methods of attack




17 of 19
Conclusions
ā€¢ Undeniable military and political motivations
ā€¢ Power is in the hand of individuals
ā€¢ There is money to be made
ā€¢ Thereā€™s as much potential for abuse and misuse as for growth
   and advancement




18 of 19
Resources
ā€¢ Bob Gourley - Open Source Software and Cyber Defense
ā€¢ http://asert.arbornetworks.com/2007/05/estonian-ddos-
    attacks-a-summary-to-date/
ā€¢   http://www.direct.gov.uk/nationalsecuritystrategy
ā€¢   http://tools.ietf.org/rfc/rfc4732.txt
ā€¢   http://schneier.com/blog/archives/2010/10/stuxnet.html
ā€¢   http://www.avast.com/virus-monitor
ā€¢   http://atlas.arbor.net/summary/dos
ā€¢   http://news.bbc.co.uk/1/hi/business/6298641.stm
ā€¢   http://www.bbc.co.uk/news/technology-11388018
ā€¢   http://www.governmentsecurity.org/
ā€¢   http://www.shadowserver.org/
ā€¢   http://news.bbc.co.uk/1/hi/8489265.stm
19 of 19

More Related Content

What's hot

Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
Ā 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
Ā 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
Ā 
Echo p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinaEcho p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinamisecho
Ā 
Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2misecho
Ā 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismAbhay Vijay
Ā 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
Ā 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
Ā 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
Ā 
Cyber warfare an architecture for deterrence
Cyber warfare an architecture for deterrenceCyber warfare an architecture for deterrence
Cyber warfare an architecture for deterrenceBikrant Gautam
Ā 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
Ā 
Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksDipesh Karade
Ā 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewareAJAY VISHKARMA
Ā 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
Ā 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
Ā 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismHiren Selani
Ā 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital FirmMohamad Fathi
Ā 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and VirusesWasif Ali Syed
Ā 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINALNicholas Poole
Ā 

What's hot (20)

Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
Ā 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
Ā 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
Ā 
Echo p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinaEcho p.410 422 ch 10, irina
Echo p.410 422 ch 10, irina
Ā 
Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2
Ā 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Ā 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
Ā 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Ā 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
Ā 
Cyber warfare an architecture for deterrence
Cyber warfare an architecture for deterrenceCyber warfare an architecture for deterrence
Cyber warfare an architecture for deterrence
Ā 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
Ā 
Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS Attacks
Ā 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
Ā 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
Ā 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Ā 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Ā 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Ā 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
Ā 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
Ā 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
Ā 

Viewers also liked

Looking Forwards to Going Backwards
Looking Forwards to Going BackwardsLooking Forwards to Going Backwards
Looking Forwards to Going BackwardsJonathan Francis Roscoe
Ā 
Weekly Code Drop July 4, creating auth tokens
Weekly Code Drop July 4, creating auth tokensWeekly Code Drop July 4, creating auth tokens
Weekly Code Drop July 4, creating auth tokensjasonc411
Ā 
Bypassing Corporate Email Filtering
Bypassing Corporate Email FilteringBypassing Corporate Email Filtering
Bypassing Corporate Email Filteringamiable_indian
Ā 
Hacker's Practice Ground - CarolinaCon - 2015
Hacker's Practice Ground - CarolinaCon - 2015Hacker's Practice Ground - CarolinaCon - 2015
Hacker's Practice Ground - CarolinaCon - 2015lokeshpidawekar
Ā 

Viewers also liked (9)

Looking Forwards to Going Backwards
Looking Forwards to Going BackwardsLooking Forwards to Going Backwards
Looking Forwards to Going Backwards
Ā 
Weekly Code Drop July 4, creating auth tokens
Weekly Code Drop July 4, creating auth tokensWeekly Code Drop July 4, creating auth tokens
Weekly Code Drop July 4, creating auth tokens
Ā 
More about PHP
More about PHPMore about PHP
More about PHP
Ā 
Base64 Encoding
Base64 EncodingBase64 Encoding
Base64 Encoding
Ā 
Bypassing Corporate Email Filtering
Bypassing Corporate Email FilteringBypassing Corporate Email Filtering
Bypassing Corporate Email Filtering
Ā 
Hacker's Practice Ground - CarolinaCon - 2015
Hacker's Practice Ground - CarolinaCon - 2015Hacker's Practice Ground - CarolinaCon - 2015
Hacker's Practice Ground - CarolinaCon - 2015
Ā 
Unicode (and Python)
Unicode (and Python)Unicode (and Python)
Unicode (and Python)
Ā 
Mastering Python 3 I/O
Mastering Python 3 I/OMastering Python 3 I/O
Mastering Python 3 I/O
Ā 
Mastering Python 3 I/O (Version 2)
Mastering Python 3 I/O (Version 2)Mastering Python 3 I/O (Version 2)
Mastering Python 3 I/O (Version 2)
Ā 

Similar to The New Front Line:An observation of cyber threats in the 21st century

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
Ā 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynetsRasool Irfan
Ā 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
Ā 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysiscodefortomorrow
Ā 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
Ā 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
Ā 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
Ā 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
Ā 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
Ā 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
Ā 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Lumension
Ā 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer wormSumaiya Ismail
Ā 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityDr. Mohamed Torky
Ā 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
Ā 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
Ā 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxharrisonhoward80223
Ā 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
Ā 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot securityAboul Ella Hassanien
Ā 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot securityAboul Ella Hassanien
Ā 

Similar to The New Front Line:An observation of cyber threats in the 21st century (20)

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Ā 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
Ā 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
Ā 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
Ā 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
Ā 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Ā 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
Ā 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
Ā 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
Ā 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
Ā 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009
Ā 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
Ā 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT Security
Ā 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ā 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Ā 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
Ā 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
Ā 
Brooks18
Brooks18Brooks18
Brooks18
Ā 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
Ā 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
Ā 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
Ā 
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhisoniya singh
Ā 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
Ā 
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024BookNet Canada
Ā 
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphSIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphNeo4j
Ā 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
Ā 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
Ā 
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...Patryk Bandurski
Ā 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
Ā 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
Ā 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
Ā 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Ā 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
Ā 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
Ā 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Ā 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Ā 
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
Ā 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Ā 
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Ā 
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphSIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
Ā 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Ā 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ā 
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Ā 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Ā 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Ā 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Ā 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Ā 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Ā 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Ā 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Ā 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Ā 

The New Front Line:An observation of cyber threats in the 21st century

  • 1. The New Front Line An observation of cyber threats in the 21st century Jonathan Francis Roscoe <jjr6@aber.ac.uk> November 4t 2010
  • 2. Outline Introduction Malice in Wonderland Cyber Warriors Worms Denial of Service Attacks The Estonian Cyberassault Stuxnet Defensive Measures The Future Conclusions 2 of 19
  • 3. The New Front Line: Estonia under cyberassault ā€¢ IEEE Security & Privacy July/August 2007 (vol. 5 no. 4) ā€¢ Overviews a Distributed Denial of Service attack on Estonia, hypothesises perpetrators, mechanisms and even cost ā€¢ Michael Lesk of Rutgers University Wrote a number of Unix utilities - lex, uucp and the predecessor to stdio Involved with a number of information systems Apparently only recent contributions 3 of 19
  • 4. Malice in Wonderland There are a variety of software threats for machines connected to a network. ā€¢ Worms ā€¢ Viruses ā€¢ Trojans ā€¢ Rootkits ā€¢ Other malware But threats may come from software not created with malicious intent.. 4 of 19
  • 5. Cyber Warriors - Who ā€¢ Academics ā€¢ Malicious programmers & ā€Script Kiddiesā€ ā€¢ Spammers ā€¢ Disgruntled employees ā€¢ Hacktivists ā€¢ Military groups 5 of 19
  • 6. Cyber Warfare - Why The why depends on the who.. ā€¢ Research ā€¢ Mischief ā€¢ Corporate espionage ā€¢ Money ā€¢ Political statements ā€¢ Terrorism 6 of 19
  • 7. Worms A computer program that self-replicates over a computer network. ā€¢ 1988 - The Morris Worm - intended to guage the size of the Internet ā€¢ 1999 - ILOVEYOU - simple VBS script that used Outlook to propagate ā€¢ 2003 - SQL Slammer - slowed general Internet traļ¬ƒc, targetted a buļ¬€er overļ¬‚ow in MS SQL ā€¢ 2010 - Stuxnet - attacks a speciļ¬c industrial PLC system from Siemens 7 of 19
  • 8. Worms - How ā€¢ Install ā—¦ Backdoor ā—¦ Ideally unnoticed ā€¢ Propagate ā—¦ Counterfeit/bogus software ā—¦ Software exploits ā—¦ Email attachments 8 of 19
  • 9. Botnets ā€¢ A collection of infected hosts running autonomous software that can repond to commands ā€¢ Worms designed to contact and respond to an owner ā€¢ Geographically dispersed ā€¢ Used for Denial of Service attacks, Spamming, Proxying, Dialing ā€¢ Software is easy to obtain and modify ā€¢ Often ā€warā€ between owners for control of susceptible machines ā€¢ Up to a quarter of personal computers may be a part of a botnet (BBC) 9 of 19
  • 10. Botnets Illustration of a Distributed Denial of Service attack performed with a botnet. 10 of 19
  • 11. Botnets A graph counting all the known command and control networks by the Shadowserver Foundation 11 of 19
  • 12. Denial of Service An extremely common form of general attack. Often use botnets. ā€¢ Type ā—¦ Distributed ā—¦ Flood - ICMP, SYN, Smurf ā—¦ Teardrop ā—¦ Peer-to-peer& multicast ā—¦ Application ļ¬‚ood ā—¦ Phlashing ā€¢ Motive ā—¦ Personal ā—¦ Business ā—¦ Political and Tactical 12 of 19
  • 13. Denial of Service Attacks Summary of DoS attack methods, from http://atlas.arbor.net/summary/dos 13 of 19
  • 14. The Estonian Cyberassault ā€¢ Stong technological society ā€¢ Followed protests in which one person was killed and several injured ā€¢ Attack not large, but target was small ā€¢ Estonia closed itself oļ¬€ from the wider Internet ā€¢ General consensus is that it was not a military attack, due to the style 14 of 19
  • 15. Stuxnet An unusually sophisticated worm. ā€¢ Utilises zero-day exploits in Windows ā€¢ Fradulent authentication certiļ¬cates ā€¢ Seeks out Programmable Logic Controllers (speciļ¬cally Siemens) - industrial controllers for electromechanical devices ā€¢ Speculation that it was targeted at nuclear assets ā€¢ Majority of infection in Iran (Symantec) ā€¢ Uses ļ¬ngerprinting, apparently to target a speciļ¬c system ā€¢ Designed to cause catastrophic physical failure ā€¢ ā€..mischief or ļ¬nancial reward wasnā€™t its purpose, it was aimed right at the heart of a critical infrastructure.ā€ - Lumension IT Security 15 of 19
  • 16. Defensive Measures ā€¢ Common sense & Awareness ā—¦ Software updates ā—¦ Physical access ā—¦ Data authentication ā€¢ Using open source platforms ā€¢ Antivirus ā€¢ Firewalls & Routers ā€¢ Intrusion Detection Systems (IDS) 16 of 19
  • 17. The Future ā€¢ Attacks can be economically and tactically signiļ¬cant to an entire nation.. and the world?.. ā€¢ Attacks will get more speciļ¬c - there are many kinds of embedded system and many of them are turning into fully-ļ¬‚edged computers ā€¢ Continuingly increasing awareness and security will force novel methods of attack 17 of 19
  • 18. Conclusions ā€¢ Undeniable military and political motivations ā€¢ Power is in the hand of individuals ā€¢ There is money to be made ā€¢ Thereā€™s as much potential for abuse and misuse as for growth and advancement 18 of 19
  • 19. Resources ā€¢ Bob Gourley - Open Source Software and Cyber Defense ā€¢ http://asert.arbornetworks.com/2007/05/estonian-ddos- attacks-a-summary-to-date/ ā€¢ http://www.direct.gov.uk/nationalsecuritystrategy ā€¢ http://tools.ietf.org/rfc/rfc4732.txt ā€¢ http://schneier.com/blog/archives/2010/10/stuxnet.html ā€¢ http://www.avast.com/virus-monitor ā€¢ http://atlas.arbor.net/summary/dos ā€¢ http://news.bbc.co.uk/1/hi/business/6298641.stm ā€¢ http://www.bbc.co.uk/news/technology-11388018 ā€¢ http://www.governmentsecurity.org/ ā€¢ http://www.shadowserver.org/ ā€¢ http://news.bbc.co.uk/1/hi/8489265.stm 19 of 19