{"id":1127,"date":"2009-03-13T09:26:59","date_gmt":"2009-03-13T17:26:59","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/?p=1127"},"modified":"2009-03-13T09:26:59","modified_gmt":"2009-03-13T17:26:59","slug":"democratized-ddos-attacks","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2009\/03\/13\/democratized-ddos-attacks\/","title":{"rendered":"Democratized DDoS attacks"},"content":{"rendered":"<p>Democratized DDoS attacks<br \/>\nhttp:\/\/blogs.zdnet.com\/security\/?p=2859<br \/>\nhttp:\/\/www.sourceconference.com\/<\/p>\n<p>Mar 13 2009<\/p>\n<p>At Source Boston 2009 (a conference on advacnted technology and security application practices), security specialist Dr Jose Nazario gave a talk describing how DDoS (Distributed Denial of Service) attacks are becoming more &#8216;democratized&#8217; or &#8216;populist&#8217;, and no longer just the tools of trained computer attackers.\u00a0 He\u00a0 cited various DDoS attacks associated with military campaigns (such as Kosovo or more recently, Georgia) which seemed to be initiated on a wide scale rather than just by a centralized group of attackers<br \/>\nThis has arisen due to simplification of the weapon, ie .\u00a0 Now it could be as simple as a centralized group of protestors or citizen militia distributing a simple script, which could be run on an end user&#8217;s machines.\u00a0 An example given was a simple Microsoft batch pinging script distributed to various complicit parties via a message board.\u00a0 More sophisticated scripts occur but the essential point is that as it becomes easier to run such attacks on a local machine, it will be easier and easier to intitiate DDoS attacks on a wide scale in this fashion.<br \/>\nThe broader issue here is twofold&#8211; the weaponization of computer systems, and the possibility that these could be leveraged by non-military, politically oriented groups as a means of protest as well as attack.\u00a0 The Russian conflict in Georgia most recently brought up broad suspicions of cyber warefare, and many rumors and warnings exist about the potential dangers which could occur.\u00a0 Even the public is generally aware of the threat, given the existance of movies like Diehard 4 (however inaccurately the threat may be represented)<br \/>\nThe speaker concluded by not commenting on the prevalence of such tools in [domestic] political groups.\u00a0 However it is safe &#8212; or unsafe&#8211; to assume that as computer integration into daily lives and processes becomes greater and greater, the likelihood of such an attack being publicly launched also increases.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Distributed Denial of Service attacks are becoming less the tool of centralized attackers  <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2009\/03\/13\/democratized-ddos-attacks\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":120,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[191],"class_list":["post-1127","post","type-post","status-publish","format-standard","hentry","category-current-events","tag-ddos"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/1127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=1127"}],"version-history":[{"count":5,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/1127\/revisions"}],"predecessor-version":[{"id":1135,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/1127\/revisions\/1135"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=1127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=1127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=1127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}