12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

12 2. POLITICAL CYBER ATTACK COMES OF AGE IN 2007As discussed in Chapter 1, throughout the 1990s, it was unclear whether attacks against computersystems would constitute a serious political statement. The possibility of a group <strong>to</strong> carryout a massive, effective, and meaningful attack in order <strong>to</strong> achieve a political goal seemed remoteat that time. However, when Russian hackers decided <strong>to</strong> take a stand as the Es<strong>to</strong>nian governmentmoved a Soviet-era statue of a Russian soldier, conventional wisdom shifted dramatically.Though there were instances of cyber warfareprior <strong>to</strong> 2007, the attacks against Es<strong>to</strong>nia were largeenough in scale <strong>to</strong> garner worldwide attention—demonstrating <strong>to</strong> the global community thatcyber warfare would add a new dimension <strong>to</strong> international relations.In this chapter, we discuss how disruption of information infrastructure can pose a significantthreat and how relatively simple means such as denial of service attacks can be an effectivemethod <strong>to</strong> attack such. We explore denial of service, related techniques, and issues in thischapter as well as describe the 2007 cyber attacks against Es<strong>to</strong>nia and the response.RELIANCE ON INFORMATION AS A VULNERABILITYEdward Waltz in Information <strong>Warfare</strong> describes the concept of the Global Information Infrastructure(GII), a service and network providing communications and control servicesworldwide. The GII would quickly and efficiently carry voice communications for phone systems,commercial data traffic, and would connect the intranets of large global organizationsvia virtual private networks. 1 The GII is an idealized concept of how humans will somedayshare information in a streamlined manner. Access <strong>to</strong> such an infrastructure would be essentialfor modern life. Today, this vision is not fully realized. However, the Internet is consideredby many as the current de fac<strong>to</strong> GII. 2Access <strong>to</strong> and the availability of the Internet in <strong>to</strong>day’s GII are essential for the function ofmany first-world services, such as banking, personal communications, and logistical coordination.Es<strong>to</strong>nian government officials have compared denial of access <strong>to</strong> the GII <strong>to</strong> closing a nationssea ports. 3 Without access <strong>to</strong> the communications infrastructure, the ability for businesses<strong>to</strong> communicate and transfer data would be significantly impeded. For instance, business-<strong>to</strong>businesscommunication and logistical coordination are highly dependent on communication.Further, some businesses rely on network connectivity for their entire operation.Denial and disruption of the GII can then serve two powerful goals. First, it can cause areal-world disruption <strong>to</strong> the operations of businesses and governments. Second, it can alsoinvoke the feeling of weakness or vulnerability in the victim because their systems and livescan indeed be disrupted in this way. As discussed in Chapter 1, availability is a key aspect ofinformation assurance. Attacks that disrupt the availability of network and computing resourcesare commonly referred <strong>to</strong> as DoS attacks. 4RUDIMENTARY BUT EFFECTIVE: DENIAL OF SERVICEIf availability is important, the disruption and denial of availability become a powerful anddesirable capability <strong>to</strong> any adversary. Denial of service attacks, commonly abbreviated as DoSor sometimes simply “dos,” are a well-known form of aggression on the Internet. The essenceof a denial of service attack is <strong>to</strong> flood the target of the attack with an abnormally large amount

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!