Malicious Cyber Terrorism = Inevitable Crisis ?
Subjective: Distribute Denial of Service attack (DDoS)
If you remember the happeningㄴ of 7th of July, 2009, then, you might know or have heard about the Distribute Denial of Service attack (DDoS). South Korea, proudly looked upon as one of the strongest countries of the Internet world, was crippled down by malicious cyber attacks. Because millions of people use the Internet daily, taking full advantage of the available services at both personal and professional levels including national security, globally cooperated research or communication, this attack becomes a serious social problem.
What is DDoS? How did it cause problems to the system?
The Internet consists of hundreds of millions of computers distributed all around the world. The interconnectivity among computers on which the World Wide Web relies, however, renders its nodes an easy target for malicious users who attempt to exhaust their resources and launch Denial-of-Service (DoS) attacks against them. A DoS attack is an intentional attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. When this attempt derives from a single host of the network, it constitutes a DoS attack. On the other hand, it is also possible that a lot of malicious hosts coordinate to flood the victim with an abundance of attack packets, so that the attack takes place simultaneously from multiple points. This type of attack is called a Distributed DoS, or DDoS attack.
In a typical DDoS attack, the army of the attacker consists of master and slave zombies. The hosts of both categories are compromised machines that have arisen during the scanning process and are infected by malicious code. The attacker coordinates and orders master zombies and they, in turn, coordinate and trigger slave zombies. More specifically, the attacker sends an attack command to master zombies and activates all attack processes on those machines, which are in *hibernation, waiting for the appropriate command to wake up and start attacking. Then, master zombies, through those processes, send attack commands to slave zombies, ordering them to mount a DDoS attack against the victim. In that way, the agent machines (slave zombies) begin to send a large volume of packets to the victim, flooding its system with useless load and exhausting its resources. Figure shows this kind of DDoS attack.
How can we protect our system from DDoS attack?
Once told by Ahn Cheol Su, famous internet security program inventor of Korea, it’s really simple. Just install a convincing vaccine program such as V3 from a free download site and run it regularly. If you are not familiar with or have not enough time to update the vaccine program to the most recent one then just click the option box that says ‘automatically update for up-to-date version of this vaccine program.’ It’s also helpful not to open or download unverified web mails or documents primary container of viruses.
Is there another potential danger related with computer or internet security?
The potential attack which can cause direct damage to major internet portal sites or which can make disruption using essential services like baking or public administration is now blocked. However, there are still other potential risks menacing internet users through mobile phones which is “PDoS.” Therefore, at least, every internet or mobile users needs to take action on securing private information from malicious access.
*Hibernate : a feature of computer operating systems where the contents of RAM are written to non-volatile storage such as a hard disk, as a file or on a separate partition, before powering off the computer. When the computer is restarted it reloads the content of memory and is restored to the state it was in when hibernation was invoked.
The Internet Protocol Journal - Volume 7, Number 4 "Distributed dennial of service Attacks" / Wkikpedia - Hibernate / McAfee research blog - DDoS damage situation / ZDNet Korea web site - 7.7 DDoS attack and situation
By Kim Un-jung, Reporter