13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Dur<strong>in</strong>g an 11-month period (April 2000-March 2001), there was a 100 percent<br />

<strong>in</strong>crease <strong>in</strong> unique scans and an almost 900 percent <strong>in</strong>crease <strong>in</strong> Intrusion<br />

Detection Alerts, based on Snort [an Intrusion Detection utility].<br />

• In the beg<strong>in</strong>n<strong>in</strong>g of 2002, a home network was scanned on average by 31 different<br />

systems a day.” [26]<br />

This list can be supplemented by many other data po<strong>in</strong>ts <strong>in</strong>clud<strong>in</strong>g:<br />

• “The most virulent [computer] virus to date <strong>in</strong>fected several million mach<strong>in</strong>es <strong>in</strong><br />

about 20 m<strong>in</strong>utes….” [15]<br />

• “When we put this [honeypot] mach<strong>in</strong>e onl<strong>in</strong>e it was, on average, hit by a<br />

potential security assault every 15 m<strong>in</strong>utes. None of these attacks were solicited,<br />

merely putt<strong>in</strong>g the mach<strong>in</strong>e onl<strong>in</strong>e was enough to attract them. The fastest an<br />

attack struck was mere seconds and it was never longer than 15 m<strong>in</strong>utes before<br />

the honeypot logged an attempt to subvert it. …<br />

• At least once an hour, on average, the BBC honeypot was hit by an attack that<br />

could leave an unprotected mach<strong>in</strong>e unusable or turn it <strong>in</strong>to a platform for<br />

attack<strong>in</strong>g other PCs. …<br />

• By us<strong>in</strong>g carefully crafted packets of data, attackers hope to make the PC run<br />

commands that hand control of it to someone else. Via this route many malicious<br />

hackers recruit mach<strong>in</strong>es for use <strong>in</strong> what is known as a botnet. This is simply a<br />

large number of hijacked mach<strong>in</strong>es under the remote control of a malicious<br />

hacker.” [27]<br />

• “IronPort recently published a report show<strong>in</strong>g that Trojan horses and system<br />

monitors – two of the most serious types of malware – <strong>in</strong>fect one out of every 14<br />

corporate PCs. That means that <strong>in</strong> an organization of 1,000 desktop PCs, there is<br />

an average of 70 computers that represent a major security risk. … Dwarf<strong>in</strong>g<br />

Trojans and system monitors are less serious types of malware, such as adware<br />

and track<strong>in</strong>g cookies, which <strong>in</strong>fect 48% and 77% of PCs, respectively.” [28]<br />

• “The number of new [COTS] software security vulnerabilities identified by<br />

security experts, hackers and others dur<strong>in</strong>g the first eight months of this year<br />

[2006] has already exceeded the total recorded for all of 2005, accord<strong>in</strong>g to<br />

Internet Security Systems.<br />

Vulnerabilities through September have reached 5,300, leap<strong>in</strong>g past the 5,195<br />

discovered for all of 2005, says Gunter Ollmann, director of the X-Force research<br />

group at ISS. ‘Eight hundred seventy-one were found to affect Microsoft<br />

operat<strong>in</strong>g systems, while 701 vulnerabilities were only found to affect Unix<br />

operat<strong>in</strong>g system,’ Ollmann says. But many vulnerabilities cross platform<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!