|
|
Security Focus: : White Papers: Denial of Service and Y2K
by Jerry Zepp, 11-09-1999
Interprise Security Group staff members spend much of their time researching current security issues
and keeping abreast of current events in the computer underground. As with many security think-tanks
and corporations, staff members often go undercover in Internet Relay Chat and other Internet forums,
posing as "hackers" to learn the latest tactics and strategies used by the underground in their
attacks on computer networks like yours.
There has been some talk in the press in the past couple of months about a large-scale, organized
disruption of service by certain elements of the computer underground correlated with the New Year,
to increase the confusion that may be caused by Y2K issues. Interprise Security Group staff members
have seen first hand the coordination that is going on in the underground community to maximize the
impact of Y2K.
It is our estimation that this massive coordination of thousands of hackers world-wide launching
denial of service attacks all at the same time could have a large impact on the world�s computer
networks. Although there are no absolutes in the computer industry, we consider it a wise move to
do what we can to inform our partners of this issue, and offer services to help mitigate our partner�s
vulnerability to the possibility of being the victim of a denial of service attack.
Although some denial of service attacks cannot be mitigated, the vast majority can. There are two main
types of denial of service attacks, Bandwidth Attacks, and System Attacks.
Bandwidth Attacks by and large do not rely on specific vulnerabilities on the networks themselves, but
target the bandwidth available to the network. If enough traffic is generated to consume all of the
available bandwidth on any given network, then that network is no longer capable of communicating with
other networks. If the attacker has more bandwidth available to him or her to launch one of these
attacks than the target of the attack has, there is no way to stop this sort of attack in the short
term. There are steps you can take, however, to keep your network�s bandwidth from being used by an
attacker to help in a denial of service attack against someone else.
System Attacks, on the other hand, rely on specific vulnerabilities in the operating systems and
system services on the machines themselves to render the systems unavailable to legitimate traffic.
These vulnerabilities can be identified and mitigated before an attack occurs. It has been estimated
that up to 90 percent of all systems attached to the Internet today are vulnerable to at least one
remote denial of service attack. This kind of percentage is exactly what computer criminals are
relying on to make the New Year�s Eve attack as effective as possible.
As part of our Internet Presence Vulnerability Assessment, ISG evaluates all operating systems and
system services on your network for just such vulnerabilities. We will make you aware of all such
vulnerabilities, both denial of service and remote compromise, and inform you of what needs to be done
to mitigate those vulnerabilities before someone tries to exploit them.
We have found that, on average, it takes our clients about two to three weeks to address the
vulnerabilities that we uncover in our testing. Due to holiday time before New Years, we suggest that
interested partners acquire our report on or before the first of December.
For More Information Contact:
Interprise Security Group
7314 Carriage Creek Road, Woodstock, GA 30189
Tel: +1 (770) 517-2685
FAX: +1 (770) 517-2685
Internet: [email protected]
|
© 2000 Interprise Security Group, Inc.
Please direct questions/comments about this site to WebKeeper
|
|
|
|