Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
• Dur<strong>in</strong>g an 11-month period (April 2000-March 2001), there was a 100 percent<br />
<strong>in</strong>crease <strong>in</strong> unique scans and an almost 900 percent <strong>in</strong>crease <strong>in</strong> Intrusion<br />
Detection Alerts, based on Snort [an Intrusion Detection utility].<br />
• In the beg<strong>in</strong>n<strong>in</strong>g of 2002, a home network was scanned on average by 31 different<br />
systems a day.” [26]<br />
This list can be supplemented by many other data po<strong>in</strong>ts <strong>in</strong>clud<strong>in</strong>g:<br />
• “The most virulent [computer] virus to date <strong>in</strong>fected several million mach<strong>in</strong>es <strong>in</strong><br />
about 20 m<strong>in</strong>utes….” [15]<br />
• “When we put this [honeypot] mach<strong>in</strong>e onl<strong>in</strong>e it was, on average, hit by a<br />
potential security assault every 15 m<strong>in</strong>utes. None of these attacks were solicited,<br />
merely putt<strong>in</strong>g the mach<strong>in</strong>e onl<strong>in</strong>e was enough to attract them. The fastest an<br />
attack struck was mere seconds and it was never longer than 15 m<strong>in</strong>utes before<br />
the honeypot logged an attempt to subvert it. …<br />
• At least once an hour, on average, the BBC honeypot was hit by an attack that<br />
could leave an unprotected mach<strong>in</strong>e unusable or turn it <strong>in</strong>to a platform for<br />
attack<strong>in</strong>g other PCs. …<br />
• By us<strong>in</strong>g carefully crafted packets of data, attackers hope to make the PC run<br />
commands that hand control of it to someone else. Via this route many malicious<br />
hackers recruit mach<strong>in</strong>es for use <strong>in</strong> what is known as a botnet. This is simply a<br />
large number of hijacked mach<strong>in</strong>es under the remote control of a malicious<br />
hacker.” [27]<br />
• “IronPort recently published a report show<strong>in</strong>g that Trojan horses and system<br />
monitors – two of the most serious types of malware – <strong>in</strong>fect one out of every 14<br />
corporate PCs. That means that <strong>in</strong> an organization of 1,000 desktop PCs, there is<br />
an average of 70 computers that represent a major security risk. … Dwarf<strong>in</strong>g<br />
Trojans and system monitors are less serious types of malware, such as adware<br />
and track<strong>in</strong>g cookies, which <strong>in</strong>fect 48% and 77% of PCs, respectively.” [28]<br />
• “The number of new [COTS] software security vulnerabilities identified by<br />
security experts, hackers and others dur<strong>in</strong>g the first eight months of this year<br />
[2006] has already exceeded the total recorded for all of 2005, accord<strong>in</strong>g to<br />
Internet Security Systems.<br />
Vulnerabilities through September have reached 5,300, leap<strong>in</strong>g past the 5,195<br />
discovered for all of 2005, says Gunter Ollmann, director of the X-Force research<br />
group at ISS. ‘Eight hundred seventy-one were found to affect Microsoft<br />
operat<strong>in</strong>g systems, while 701 vulnerabilities were only found to affect Unix<br />
operat<strong>in</strong>g system,’ Ollmann says. But many vulnerabilities cross platform<br />
27