Difference between revisions of "Time constraints in an effective cyber attack?"

From ScenarioThinking
Jump to navigation Jump to search
(New page: The Slammer worm, also known as the Sapphire worm, hit at 5:30 a.m. GMT on Jan. 25, 2003 -- Superbowl weekend. Exploiting a vulnerability in servers running Microsoft SQL Server 2000 softw...)
 
 
Line 1: Line 1:
The Slammer worm, also known as the Sapphire worm, hit at 5:30 a.m. GMT on Jan. 25, 2003 -- Superbowl weekend. Exploiting a vulnerability in servers running Microsoft SQL Server 2000 software, Slammer was the fastest cyber attack in history. According to a team of researchers from the University of California at San Diego, Lawrence Berkeley National Labs, and Silicon Defense, the number of infections doubled every 8.5 seconds and Slammer did 90 percent of its damage in the first 10 minutes of its release. Among other things, the worm took down parts of the Internet in South Korea and Japan, disrupted phone service in Finland, and slowed airline reservation systems, credit card networks, and automatic teller machines in the U.S.
Since the military doctrine of being fast and precise proved to be working very good. The question arose for its application in the cyber space. In order for some group (no matter of its motivation or affiliation) to conduct an attack on multiple systems simultaneously causing enormous damage, time is of essential importance.
One such example is the Slammer worm, that hit servers running Microsoft SQL Server 2000 and in the first 10 minutes did 90% of the damage. The worm disrupted intenet in Japan and Korea, slowed airline reservations, credit card networks and automatic teller machines in U.S. and phone services in Finland.
This isolated case proves that if a short time constrained attack may cause a lot more damage than separate attacks conducted over some longer period of time.
Also, time constraint is crucial since in order to be most effective, one has to launch attacks on multiple systems in very short time in order to prevent backups from taking over or leaving some part working.

Latest revision as of 13:55, 25 April 2008

Since the military doctrine of being fast and precise proved to be working very good. The question arose for its application in the cyber space. In order for some group (no matter of its motivation or affiliation) to conduct an attack on multiple systems simultaneously causing enormous damage, time is of essential importance. One such example is the Slammer worm, that hit servers running Microsoft SQL Server 2000 and in the first 10 minutes did 90% of the damage. The worm disrupted intenet in Japan and Korea, slowed airline reservations, credit card networks and automatic teller machines in U.S. and phone services in Finland. This isolated case proves that if a short time constrained attack may cause a lot more damage than separate attacks conducted over some longer period of time. Also, time constraint is crucial since in order to be most effective, one has to launch attacks on multiple systems in very short time in order to prevent backups from taking over or leaving some part working.