Ramblings of an old Doc
But, it isn't
Published on February 13, 2011 By DrJBHL In Personal Computing

 

 

                                                                

 

"A new cyberweapon could take down the entire internet – and there's not much that current defences can do to stop it."

So say Max Schuchard at the University of Minnesota in Minneapolis and his colleagues, the masterminds who have created the digital ordnance.

So, what is it and how does it work?

The Way The Internet Works:

We have a “smart” system. Not all the connections work all the time. In reality, there are routers on the net which are ‘up’ and ‘down’ all the time.

Any given “message” is broken up into packets which are shuttled around the blocked spots because the net is made to check if the immediate next router is up or down and if down is rerouted. At the final step, the packets are reassembled into the original message. When a communication path changes, nearby routers inform their neighbors through a system known as the border gateway protocol (BGP). These routers inform other neighbors in turn, eventually spreading knowledge of the new path throughout the internet.

The Method of Attack:

A previously discovered method of attack, named ZMW – after its three creators Zhang, Mao and Wang, researchers in the US who came up with their version four years ago – disrupts the connection between two routers by causing the ‘sending’ router to think the ‘receiving’ router is ‘down’.

When enough computers on the net are infected and made part of a huge “botnet”, the internet will be “down”, although in reality, it’s perfectly capable of transmitting information. How large a botnet is required? Schuchard has calculated approximately 250,000. This wouldn’t be the run of the mill DDoS attack which swamps servers with traffic. This would be the opposite.

Here the botnet would map and identify central “choke” points and cut there. Rerouting traffic would only replicate the original process of mapping and cutting in waves because of the BGP protocol which takes time to propagate. The backlog would become so great, the net would collapse. With every router in the world preoccupied, natural routing outages wouldn't be fixed, and eventually the internet would be so full of holes that communication would become impossible. Shuchard thinks it would take days to recover.

So, what’s the defense? Well, an “off switch”. “But no such thing exists”, we all say. Sure it does: Just by adjusting the BGP from short to long.

This is how to launch a cyberattack and protect one’s own country’s net from attack. Egypt did exactly that.

Impractical solution number two: Send BGPs by a separate ‘shadownet’. Impractical because that would require a second Internet to be built. Another solution is to have 10% of operators monitoring the health of the Internet by alternative means, and that probably would prove difficult despite what was seen with the net disruptions caused by the Slammer Worm in 2003.

Source: Gizmodo


Comments (Page 1)
3 Pages1 2 3 
on Feb 13, 2011

Gee, that's no good.

Best regards,
Steven.

on Feb 13, 2011

eewwwww   not good...   best regards

on Feb 13, 2011

So basically we could shoot ourselves in the foot thinking we're under attack when in reality no such attack exists. Worse case scenario. Playing Devil's advocate here. Feint and counter-feint. If Egypt did it and they've gotten most of their tech from the US, imagine what the US and allies can do. Insidious world we live in.

on Feb 13, 2011

First off, the article title is black, and I cannot read it over here because the GC2 forums use a black background.

But aside from that, is there any way to defend against this without just doing the hackers' work for them??

on Feb 13, 2011

^ One solution to the visibility problem would be simply to logon to JoeUser.com, or to WinCustomize.com.

"Another solution is to have 10% of operators monitoring the health of the Internet by alternative means, and that probably would prove difficult despite what was seen with the net disruptions caused by the Slammer Worm in 2003."

By doing that, we would be asking to have the Router Managers and ISP Network Managers "open an umbrella before it started raining", so to speak. That's a difficult thing to ask or to mandate, but so far that's the only solution short of having a 'shadow' internet as far as I have researched.

on Feb 13, 2011

^ One solution to the visibility problem would be simply to logon to JoeUser.com, or to WinCustomize.com.
Or highlight the page...

But I'm mostly curious as to how exactly one would "trick" a router into falsely identifying another router as "down".

on Feb 13, 2011

Talk about insidious.

Best regards,
Steven.

on Feb 13, 2011

Be prepared to do unto others before they do unto you. If a threat is perceived perhaps having a pre-emptive solution is in order.

on Feb 13, 2011

If a threat is perceived perhaps having a pre-emptive solution is in order.

Which would be.....?

Hackers are hard to find in realspace and move around to a fair degree, and although I do not doubt that the US would try to go to war with any country the attacks came from I don't think that would really, you know, work. The hackers would have to be found and removed from play before they were able to implement something like this, which would be hard considering that it is unlikely that they would give much warning.

on Feb 13, 2011

Ever hear of a piggy-back? A signal superimposed on any incoming signal that can ride it back to the source. The cable companies did that years ago to prevent their signals being read from 'hacked' cable boxes. It was called a bullet. Signals can be traced, even wifi. Think of what SETI uses to trace signals from space, monitoring literally billions at a time. SETI's been operating since the sixties. In fifty years the US has improved on the technology tremendously. You'd be surprised what they are capable of.

on Feb 13, 2011

Guess anything is possible with the minds available to do these type of things. I also know there is nothing the regular computer user can do about such a situation. Well  again I guess there is and that would be to never turn on your computer. So really this is just another thing to relate to the Off switch. First we had articles saying there was actually an off switch now it says there is no such thing. Even if its possible to do this type of stuff we should just go on with our computer enjoyment and not worry so much about what may or may not happen. So enjoy today as you may or maynot not have it tomorrow but then you may not even be here tomorrow.

on Feb 13, 2011

The best thing that could ever happen would be that the Internet die a quick and painful death. I use it because everyone else does and I do not want to be left out. Wouldn't it be great to actually read letters that were sent in the mail or to get our news by visiting the corner news stand and buying a cheap news paper? We feel as if we need it because its so versatile in what it can do but does the Internet really make people any better off or even more content with their lives? This generation will tell you they cannot live without it. Yes they can they just don't want too. It's like the drug addict who is content with their miserable lives and choose not to live without the drugs. The drugs make them not think right and I am beginning to think computers and the Internet are making people not to think right too. Perhaps I am living in the wrong era and and should start a modern luddite movement where we destroy every computer we can find.     

on Feb 13, 2011

But I'm mostly curious as to how exactly one would "trick" a router into falsely identifying another router as "down".[/quote]

Sorry, Scoutdog...not being a hacker, I wouldn't know.

[quote who="Uvah" reply="8" id="2887249"]Be prepared to do unto others before they do unto you. If a threat is perceived perhaps having a pre-emptive solution is in order.

I see you now understand my earlier post about an off switch for the internet... I believe that there must be such a switch in the case of a botnet attack such as this.

Hackers are hard to find in realspace and move around to a fair degree, and although I do not doubt that the US would try to go to war with any country the attacks came from I don't think that would really, you know, work. The hackers would have to be found and removed from play before they were able to implement something like this, which would be hard considering that it is unlikely that they would give much warning.

For every hacker, there's one better. Just have to harness our resources. Just as the cash prize prize is being offered for the hacker who can 'poison' or 'opt' the new browsers.

I also know there is nothing the regular computer user can do about such a situation.

One step is to adopt safe browsing practices, and possibly a temporary virtual environment while opening "trusted" emails. Also, using software such as Threatfire and malware sniffers.

First we had articles saying there was actually an off switch now it says there is no such thing.

I never said there wasn't such a switch. I asked "Should there be...?".

but then you may not even be here tomorrow.

The ultimate "Off Switch". Just hope for a friend to erase your browser history.  JK, Dave... you're one of the good guys.

on Feb 13, 2011

For every hacker, there's one better. Just have to harness our resources. Just as the cash prize prize is being offered for the hacker who can 'poison' or 'opt' the new browsers.
The question is, will the better one want to work for the government... or the "other-ment".

on Feb 13, 2011

 

I also know there is nothing the regular computer user can do about such a situation.


1. One step is to adopt safe browsing practices, and possibly a temporary virtual environment while opening "trusted" emails. Also, using software such as Threatfire and malware sniffers.

2. First we had articles saying there was actually an off switch now it says there is no such thing.

I never said there wasn't such a switch. I asked "Should there be...?".

3. but then you may not even be here tomorrow.

 

 1. Safe browsing is pretty standard with most of us I would say.

 

2. Doc I never said you said there wasn't such a thing as an off switch and know you only asked if there should be one. I have read it all over the Internet on many different sites a couple said there was and some said no such thing was available.

 

3. Hell I may not be here after I post this. Something may just fly out of my computer and suck my brain out (such as it is but won't be getting much information), one never knows. 

 

 

3 Pages1 2 3