12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ESTONIA IS HIT BY CYBER ATTACKS17FIGURE 2.1 The Bronze Soldier of Tallinn. The relocationof this statue, which commemorates the Russianvic<strong>to</strong>ry against Nazi Germany in World War II, led <strong>to</strong> massivecyber attacks against the Baltic State by Russianhackers. Source: Petri Kohn via Wikimedia Commons. 24E-mail servers on the Internet are used <strong>to</strong> receiving unsolicited messages at continuous butmoderate pace. They use techniques from machine learning <strong>to</strong> classify incoming messages asspam or not spam. The purpose of this classification is entirely <strong>to</strong> lessen the irritation <strong>to</strong> humanusers of unsolicited messages. E-mail severs exist entirely <strong>to</strong> process incoming messages;therefore, if they are sent an overwhelming quantity of e-mail, they are generally unprepared<strong>to</strong> deal with this in a graceful way. Which messages are part of the flood, and which messagesare illegitimate? The system would not know until it reads them all, and since computingpower is finite, the availability of e-mail servers can be negatively impacted by sending ita very large number of messages.On April 29, a flood of messages made the e-mail servers of the Es<strong>to</strong>nian parliamentunavailable. This system would remain off-line for 12 h. What direct impact this had onthe government’s response both <strong>to</strong> the computer-based attacks and <strong>to</strong> the preceding riotsis unknown. It is not difficult <strong>to</strong> imagine that the unavailability of e-mail significantly impactedthe situation, especially given the lack of direct action that the government could take<strong>to</strong> res<strong>to</strong>re availability (Figure 2.2).This is a difference between electronic disruptions and physical disruptions: the sourceand means of a physical disruption can be identified. If protes<strong>to</strong>rs impede the availabilityof a road, clearing the protes<strong>to</strong>rs will res<strong>to</strong>re access <strong>to</strong> the road. In the face of a flood of messagessent <strong>to</strong> an e-mail server, what means has the administra<strong>to</strong>rs of this server at hand <strong>to</strong>res<strong>to</strong>re its availability? The source of the messages can be distributed across the entireInternet.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!