Users login

Create an account »


Users login

Home » Hacking News » DoS DoS DoS, the attacks will never stop.

DoS DoS DoS, the attacks will never stop.

by Majik on September 27th, 2001 WASHINGTON--U.S. government and private-sector computer networks remain highly vulnerable to Internet-based attacks, experts said, incidents that will probably increase in the near future.

The United States should step up efforts to defend against an increase in computer viruses and worms, "denial-of-service" attacks that knock Web sites offline, and other efforts to disable the Internet, telephone systems, banking networks and other vital electronic systems, electronic security experts told Congress on Wednesday.

While both the FBI's National Infrastructure Protection Center (NIPC) and private industry are working hard to stop the threat, the U.S. government should devote significant funds to encourage long-term research, they said.

"What is needed today is essentially a Manhattan Project for counter-terrorism technology," said Michael Vatis, director of the Institute for Security Technology Studies at Dartmouth College.

Recent conflicts between Israel and the Palestinians, the U.S. and China, and India and Pakistan have inspired hackers on both sides to launch attacks, Vatis said, and those cyberattacks are increasing in volume and sophistication.

Cyberattacks on the United States could come from terrorist groups, sympathetic nations like Iraq and Syria, and others bearing a grudge against the United States, said Vatis, who used to head the NIPC.

While no cyberviruses accompanied the Sept. 11 attacks on the World Trade Center and the Pentagon that left nearly 7,000 dead or missing, a new computer worm called Nimda emerged exactly one week later, infecting roughly 100,000 computers worldwide, 80,000 of those in North America.

Computer users can defend against such worms and viruses by downloading software patches, but the software industry needs to take security more seriously when it designs new products, said Richard Pethia, director of the virus-fighting CERT Center at Carnegie Mellon University in Pittsburgh.

"Today's commercial off-the-shelf software is riddled with holes," Pethia said.

Software makers should design more secure products, Pethia said, and ship them to consumers pre-configured with high security settings. Such efforts will probably mean higher costs and slower progress in the short term but will pay off in the long term, he said.

Both Nimda and Code Red, a computer worm that first emerged during the summer, spread through security holes in computer-server software made by Microsoft. Nimda can also spread through e-mail or corporate networks.

Government agencies should do more to ensure the security of their computer systems as they are frequent targets of cyberattacks, said Joel Willemssen, managing director of information technology issues at the U.S. General Accounting Office.

"Federal agencies continue to have serious and widespread computer risks," Willemssen said.

All agreed that the U.S. government should devote more money to security efforts within government, like NIPC, and to grants for outside researchers at universities and corporations.

"Over the long term, the importance of research and development is great. We can never really get ahead of the problem through patches," Vatis said.

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »