DOC PREVIEW
DARTMOUTH COSC 099 - BLACK + WHITE= GRAY

This preview shows page 1-2-3-4 out of 12 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Black + White = GreyBackgroundWhy DDOS Is DifferentSlide 4Common ToolsBasics of A DDOS AttackWhere Do These Tools Come From?What Benefits Do Distributed Denial of Service Tools Provide?What Problems Do These Tools Present?Who is responsible?ConclusionQuestionsBlack + White = GreyEthical Issues Surrounding the Creation and Distribution of Hacker Tools Used in Distributed Denial of Service AttacksJoseph LevineFebruary 29, 2000Background•Mid-1999 distributed DOS software begins to appear in public hacking & security forums•August 17, 1999 University of Minnesota attacked by a network of hundreds of systems running Trinoo (aka Trin00)•November 2-4 1999 CERT hosts workshop for 30 top security experts on “Distributed-Systems Intruder Tools”•February 7, 2000 Yahoo effectively taken offline by distributed denial of service attackWhy DDOS Is Different•Security exploits are published daily.•Most security problems relate to a specific issue that can be corrected by vendors.•Denial of service vulnerabilities are hard to eliminate.Why DDOS Is Different•Distributed denial of service attacks are even more difficult to address.•Determining the true source of a distributed attack is very complicated, meaning that attacks may take longer to stop and attacker are more difficult to catch.Common ToolsBasics of A DDOS AttackWhere Do These Tools Come From?•Underground Networks of sophisticated hackers write tools like the ones being discussed here.•Some are released to the public by individuals who claim to desire only to allow people to protect themselves.•Once source code is available many more people can create their own variants making detection more difficultWhat Benefits Do Distributed Denial of Service Tools Provide?•Increased general awareness of security issues•Security Analysts can review source code to learn more about the exploit•Authors gain respect amongst their peersWhat Problems Do These Tools Present?•Lowers the minimum skill level required to execute a distributed attack•Decreases the amount of effort required to execute a distributed attack•Availability of source code for these tools allows them to evolve rapidlyWho is responsible?•Anyone who uses these tools is clearly responsible for their own actions•Authors of these tools are at fault as well. By providing a simple tool kit to commit crimes they are morally responsible for the crimes being committed.Conclusion•Creating distributed attack tools like Tribal Flood Network is ethically wrong.•Researching vulnerabilities fine, as is writing reports detailing problems.•Releasing functional code or binaries that have no use other than harming others is ethically


View Full Document

DARTMOUTH COSC 099 - BLACK + WHITE= GRAY

Download BLACK + WHITE= GRAY
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view BLACK + WHITE= GRAY and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view BLACK + WHITE= GRAY 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?