Worms, DDoS and Cyber-Terrorism

Written by Kim Fitzer, Hinsdale Central High School, Hinsdale, Illinois
Original Written by David. Stone, University Laboratory High School, Urbana, IL


Introduction

In addition to viruses, Trojan horses and logic bombs, additional hazards have materialized that may have a much greater impact on our ability to continually and safely access the Internet. These new cyber-threats run the gamut from nothing more than a mere nuisance to affronts on our national security. Furthermore, they seem to be proliferating at a much faster rate than previously observed(1). A government agency responsible for tracking breaches in security reported that incidents involving computer network security breaches rose from almost 10 thousand just two years ago to nearly 35 thousand in the first 9 months of 2001(2). And in the wake of the September 11 attacks, the rate of computer security breaches is dramatically increasing. The new attacks include:

  • Worms
    Often incorrectly called a virus, a worm is an independent program that has the ability to replicate itself across networks and from machine to machine. It has the ability to cause significant network congestion and can render a communication system useless if allowed to run unchecked. Recently, two worms, Code Red(3) and Nimda(4) worms wreaked havoc on business and institutional servers throughout the world.
  • Blended Threats
    The newest wave of viruses has the characteristics of a virus, worm and Trojan horse combined. Embedded in its sophisticated code are instructions for the worm to sometimes behave like a virus, or a software program which then spreads its code to others computers, or a Trojan horse which may mutate within a victim's computer and cause irreparable harm to the operating system. Most recently, the Klez(5) virus surfaced and spread quickly throughout the world infecting virtually everyone's email system. Seven months after its discovery, it appears to still be at large.
  • Distributed Denial of Service Attacks
    DDoS attacks employ armies of "zombie" machines that are controlled by a single master server. These machines will then inundate a target server with thousands of packets of data, in an attempt to overwhelm the server and cause it to crash. Beginning in February of 2000, e-commerce sites were the subject of DDoS attacks(6), and in May of 2001, the whitehouse.gov site fell under a barrage of denial of service assaults (7). DDoS attacks are on the rise and are particularly common after a military attack, such as in Israel, Palestine, India and Pakistan. Any computer that is unprotected by firewalls can be used as a "zombie," and personal computers with high-speed Internet access are especially vulnerable.
  • Unauthorized Intrusions
    Sensitive information such as credit card numbers and classified government information are the targets of these assaults on computer systems. Attackers usually seek to pilfer or alter the information they find, and the results can be especially damaging. International organized crime networks and foreign adversaries are the primary culprits (8).
Issues
  • Schools are generally not seen as targets of cyber-terrorists. However, the presence of technologically savvy teen programmers, or "script kiddies" in schools is a concern, particularly for schools with inadequate security. Young hackers are not usually skilled enough to write their own hacking programs and rely on the 30,000 or so downloadable hacking applications available on the Internet to wreak havoc on their school's servers (9). The damage that they are capable of is usually confined to disabling filters and gateway software, or accessing student information systems. So far, there have been no reports of truly malicious or deadly threats from the teenage hackers. Still, given the violence of the Columbine High incident, it seems that the potential exists.
  • Because the authors of viruses, worms and other cyberthreats are difficult to trace, authorities involved with school security have no way of knowing whether a virus entered the system via someone's email, or was generated by a student within the school.
Minimizing The Potential
  • Follow "best practices" in establishing and maintaining a school security system
    It is advised that a regular system of security maintenance be established and followed: regularly update operating systems and software, strictly enforce password policies and AUPs, disable unnecessary services, install and update anti-virus software on a very frequent basis, and employ intrusion detection systems and firewalls. Prevention is the best cure, and it is reported that schools may be the most vulnerable to attacks because they use older systems with unwieldy security programming, or outdated protocols.
  • Be On High Alert
    School system administrators should be on high alert for the warning signs of hostile cyber activity. Frequent scanning of internet logs and incoming and outgoing email should be performed regularly, and any suspicious activity should be looked into and reported to the administration, and the local authorities, if necessary. An emergency incident plan should be established as well, in case the system is temporarily or permanently disabled by a virus.
  • Employing Ingress and Egress Filtering
    To guard against possible DDoS attacks, schools can program network hardware to discard any outbound packets whose source IP address does not belong to the router's client networks (egress filtering). Likewise, any inbound IP packets with un-trusted source addresses should be filtered out before they have a chance to enter the network (ingress filtering)(10).
Legal Implications
  • Schools may find themselves subject to lawsuits if unauthorized intrusions result in the access of sensitive student information such as medical information, grade reports, and scheduling.
  • Because of the perceived anonymity of the Internet, students that engage in acts of cyber terrorism may not feel the same sense of guilt and wrongness which would be experienced if the transgression were outwardly observable. Creating a virus and releasing it into the school's security system is wrong, but knowing that there is little chance of getting caught may result in being more attractive than defacing school walls, or damaging physical property (11).
Frequently Asked Questions (FAQ)
Are AUPs effective weapons against cyber threats such as viruses, worms and other attacks?

While AUPs can guard against some types of Internet improprieties, the primary function of an AUP is to limit the legal liability of a school or district in the event that student or employee misuse of the Internet leads to foul play. Students that engage in hacking, virus programming and the like may be operating under the theory that they will not be caught and so have no regard for an AUP. Furthermore, an AUP is absolutely no defense against an attack from outside of the school.

What is the best defense against these acts of cyber terrorism?

As stated before, the best defense is a good offense. School security administrators should be on high alert for possible breaches in the firewalls, and frequently update their virus protection software. Severe penalties and a strict enforcing of security policies and AUPs may also have some impact on discouraging student improprieties. Scanning incoming and outgoing email for viruses and worms may also stop a potential intrusion, and programming routers to automatically discard any packet of information that does not originate from a network IP address can also protect school computers.

How real is the threat of cyber-terrorism?

While schools at this point do not seem to be targets of terrorism, there is an increased awareness that the potential for a widespread attack on multiple public institutions exists. Vulnerabilities in our military, air traffic control, financial and power infrastructures have been reported by the Department of Defense, the Center for Strategic and International Studies, the FAA and the National Security Council(12). Already, DDoS attacks have been reported on government websites throughout the world, and worse, they seem to coincide with military, paramilitary and terrorist events and operations. After a Chinese fighter plane and an American surveillance plane collided in May of 2001, U.S. government websites were flooded with DDoS attacks and pro-Chinese defacements(13). Experts agree that worldwide terrorist organizations such as Al Qaeda are increasing their technological sophistication by developing communication cryptography through the Internet; it seems likely that they are also capable of global cyber terrorist acts as well. Beyond the terrorist threat, many governments are working on developing cyber weapons of their own, including the U.S. Department of Defense, in the event of a military attack(14). Because the world has become increasingly dependent on information technology, it also has created an increasingly attractive target.

Annotated Web Site Directory
Eschool News is an extremely valuable website that focuses on k-12 schools and all aspects of educational technology. Has links regarding AUPs, filtering, E-Rate, RFPs, information on complying with CIPA, problem-based learning using technology, and of course, cyber-terrorism.
http://www.eschoolnews.com/

Much of the information that exists about schools and their relationship to cyber crime can be found on this site. Topics include hacking, AUPs, security precautions, latest viruses, articles of types of viruses, case law, filtering and other pertinent subjects.
http://www.lhric.org/security/

Developed by child Internet safety guru Nancy Willard, this very useful and informative website can be used as a guide for parents, teachers and students for developing an Internet safety plan. Ms. Willard advocates the teaching of responsible use of the Internet, and relies on the teaching of ethics to illustrate her point.
http://responsiblenetizen.org/

Other References
  (1) 2001. Vatis, Michael A. "Cyber Terrorism: The State of U.S. Preparedness" Statement prepared for the House Committee on Government Reform Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations.
Statement given on September 26, 2001.

(2) 2001. Rodriguez, Ciro D. "Cyberterrorism - An Emerging Threat To National Security." Published on infowar.com http://www.infowar.com/class_3/01/class3_112901a_j.shtml

(3) 2002. "CERTŪ Advisory CA-2001-19 "Code Red" Worm Exploiting
Buffer Overflow In IIS Indexing Service DLL" Published on Carnegie Mellon University Software Engineering Institute's site. http://www.cert.org/advisories/CA-2001-19.html

(4) 2001. "CERTŪ Advisory CA-2001-26 Nimda Worm: Published on Carnegie Mellon University Software Engineering Institute's site. http://www.cert.org/advisories/CA-2001-26.html

(5) 2002. Brandt, Andrew. "Klez: The virus that won't die?" Excerpt from PC World Magazine, Published on Newtwork World Fusion. http://www.nwfusion.com/news/2002/0703klez.html

(6) 2000. McWilliams, Brian."Is Scanning the Answer to Web Attacks?" Published on Internet.com website. http://www.internetnews.com/bus-news/article.php/3_302461

(7) 2001. Lemos, Robert. "Hackers Cripple White House Site." Published on Tech News/CNET.com. http://news.com.com/2100-1001-257068.html?tag=rn

(8) 2001. Vatis, Michael A. "Cyber Terrorism: The State of U.S. Preparedness" Statement prepared for the House Committee on Government Reform Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations.
Statement given on September 26, 2001.

(9) 2002. Reilly, Peter. "Cyberterroriem and Schools: Scriptkiddies, Hacktivists and Cyberterrorists." Published on LHRIC School Security Site. http://www.lhric.org/security/desk/letter7.html

(10) 2001. Vatis, Michael A. "Cyber Terrorism: The State of U.S. Preparedness" Statement prepared for the House Committee on Government Reform Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations.
Statement given on September 26, 2001.

(11) 2000. Willard, Nancy. "What is Right and What is Wrong." Published in Responsible Netizen Center for Advanced Technology at University of Oregon at Eugene. p.2

(12) 2002. Reilly, Peter. "Cyberterrorism and Schools Part II: How Real is the Threat of Cyberterrorism?" Published on LHRIC School Security Site. http://www.lhric.org/security/desk/letter8.html

(13) 2001. Lemos, Robert. "Hackers Cripple White House Site." Published on Tech News/CNET.com. http://news.com.com/2100-1001-257068.html?tag=rn

(14) 2002. Reilly, Peter. "Cyberterrorism and Schools Part II: How Real is the Threat of Cyberterrorism?" Published on LHRIC School Security Site. http://www.lhric.org/security/desk/letter8.html

5 August 2002

Return to Addendum to Educator's Guide to Computer Crime and Technology Misuse
Developed 29 July 2002.