Distributed Denial of Service (DDoS) Attacks: A New Form of Online Business?

first_img“The single biggest existential threat that’s out there, I think, is cyber.”- Michael MullenNowadays, Distributed Denial of Service or DDoS attacks have proven to be the most popular weapons in the arsenal of cyber-criminals. They are used to disrupt institutions’ operations, extort money, damage reputations or sometimes by companies to undermine their competitors. The victims of these cyber-attacks are individuals and all major industries including aerospace telecommunications, Internet Service Providers (ISPs), banks, and other institutions including governments. DDoS attacks can be staged by anyone including a 15 year-old kid working out of his parents’ basement. A case in point is the one involving two the Israelis Itay Huri and Yarden Bidani (both 18 years old) who were recently arrested by the U. S. Federal Bureau of Investigation (FBI). Both men were arrested for masterminding a DDoS attack for hire service that can be used to take down their victims, according to the site TheMarker.com.The goal of today’s article is to inform Liberians and other residents about what DDoS attacks are, and how they have become a “service” or business that individuals and other institutions can use, to undermine the economy and national security. I know that a more detailed explanation and better education may be required on this topic to create better awareness, so as time goes on, I shall endeavor to provide more insight into what this potential threat is to our country. Earlier, I briefly mentioned the DDoS attacks carried out by the two Israeli kids who were subsequently arrested by the FBI. In recent times, there was another major DDoS attack which involved an Internet Services Provider (ISP) called Dyn. Dyn is a company which has customers such as Twitter, Reddit, and Netflix. The DDoS attack on Dyn prevented many users living on the east coast of the United States from navigating to popular websites such as Twitter, Reddit, and Netflix. When it comes to major companies that have experienced a DDoS attack, I can go as far back as February of 2000 to recap the widely known distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. But it will take more than an article to list institutions that have experienced a DDoS attacks and the impact they have had on them and their bottom line. So what exactly is a DDoS attack? A succinct definition from Verisign is as follows: “a distributed denial-of-service (DDoS) attack is a malicious attempt to bring down networks, Web-based applications, or services by overwhelming these resources with too much data or impairing them in some other way.” Another definition from SearchSecurity is: “a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.” A DDoS attack involves a flood of incoming messages to a target system. This flood of incoming messages to the target system essentially forces it to shut down, thereby denying services provided by the system to legitimate users. The “compromised systems” being referred above are also known as botnet. According to SearchSecurity.Com, “a botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet.”A botnet sends multiple requests to compromise its victim’s infrastructure by flooding its bandwidth, essentially jamming the victim’s Internet connections and forcing legitimate users out. These attacks pose major challenges to businesses of all types—but particularly to Internet and hosting providers, which can suffer blows to bandwidth, reputation, and bottom line. Note that the average DDoS attack lasts about 17 hours. Hence, one can only wonder what the loss is to the victim. In fact, according to Andrew Lerner, a member of the Gartner Blog Network: “based on industry surveys, the number we typically cite is $5,600 p/minute, which extrapolates to well over $300K p/hour.” The article written 12 November 2014 titled, “The Cost of Downtime,” also indicates that the amount listed above is just average, which is due to the magnitude of variance and also, taking into consideration the characteristics of the business and its environment. While this may be an old article, it does give us an idea of the impact of a DDoS attack on companies. DDoS attacks have become a service for hire. This means any individual or company can hire cyber attackers to take down another individual’s or company’s network for a fee. According to a story published on “The Register’s” website (www.theregister.co.uk), there are DDoS attack for-hire groups that offer their services for as low as US$5.In a previous paragraph, I mentioned the case of the two Israeli kids Itay Huri and Yarden Bidani and a few other cases of DDoS attacks. These cases and the plethora of DDoS attack cases that we read about on the Internet and other places, should serve as an eye-opener for all institutions in Liberia. Just because we are a small and poor country in Africa does not preclude us from DDoS attacks or any other cyber-attack. Who knows, maybe some of our institutions have already being attacked but for the fear of damaging their reputation, have refused to publicize this experience. Around the world, some companies and now countries (USA, Russia, China, North Korea, et al) try to fight back in their own ways; this may not be legal (for companies; I don’t know about countries). But when faced with a DDoS attack as an individual or a company, the best thing to do is to report the attack to security officials or maybe local regulators. I want to assume these agencies have the mechanism in place to track, combat and defeat these culprits.In Liberia a lot of folks take cybersecurity for granted. These folks believe that cyber attackers do not care about a poor country like Liberia when they can loot more from affluent nations and institutions. This is entirely untrue. Cyber criminals do attack countries like Liberia; that is if we have not already been attacked, as I assumed above. But be that as it may, we must all ensure that our computers systems and networks connected to the internet are secure. Also, whenever we are attacked, we must ensure that the proper mechanisms are applied to avoid a repetition or propagation of such event. Like we say in Liberia: “no shame face inside oooh.” Finally, I serve as the President of the Internet Society Chapter of Liberia. The Guiding principle of the Internet Society is “Internet Access for all.” Thus, it is the responsibility of the Chapter to ensure that access to Internet is available. We have the responsibility to expose those ills or malpractices that hinder internet access and create national awareness. When and if we discover things like DDoS attacks or any malpractice that impacts our economy or national security we have a responsibility to ensure that right security authorities are informed. For now, we try to create awareness so that we don’t fall victim as have other countries. Share this:Click to share on Twitter (Opens in new window)Click to share on Facebook (Opens in new window)last_img read more

Cloned mules to pack stands at race

first_imgWINNEMUCCA, Nev. – Two qualifying heats, two wire-to-wire victories, two nearly identical times. It was almost like the same mule won twice. Idaho Gem, the world’s first equine clone, and his brother, Idaho Star, made successful debuts Saturday in what scientists billed as the first professional competition between clones of any kind. The mules will compete against each other – and six naturally bred animals – for an $8,500 purse in the finals of their bracket today at the 20th annual Winnemucca Mule Race, Show & Draft Horse Challenge. AD Quality Auto 360p 720p 1080p Top articles1/5READ MORE11 theater productions to see in Southern California this week, Dec. 27-Jan. 2Idaho Gem covered his 350-yard sprint Saturday in 21.817 seconds, winning by 1 lengths over five rivals. Idaho Star was less than three hundredths of a second faster, finishing in 21.790 seconds to win by a half length over four competitors. “For both to win first, it is awesome,” said Don Jacklin, an Idaho businessman who helped finance the cloning project. “I think it is going to open a lot of eyes as far as cloning. I think the race experience will go a long way to show what cloning can do.” The clones were born three years ago and carry identical DNA taken from a fetus produced by the same parents that sired a champion mule racer. Researchers on the cloning team said Idaho Gem and Idaho Star have been separated for two years and trained separately, so watching how they perform against each other will offer insight into the role played by environmental variables, such as diet and training regimens, in developing mules. Gordon Woods, the University of Idaho scientist who created the clones, said he was pleased the clones passed their first major test. He noted that the historic cloning of Dolly the sheep in 1997 decreased her strength and agility. “It says to me very clearly that the technology by which we cloned them appears to have not decreased their athletic performance,” Wood said. “For me, it was a huge milestone achievement on a long uphill climb.” Ron Woark, 62, of Reno placed $5 bets on each clone to win, picking up $9.50 for Idaho Star and $8 for Idaho Gem. “I wanted both to win because I’m a techie geek and I like the fact that techie geeks are making advances on cloning,” Woark said. “A lot of good to human health can come as a result of it.” Bill Sims, 55, of Winnemucca said he bet against the clones “to prove nature knows best.” “I have doubts about cloning,” he said.160Want local news?Sign up for the Localist and stay informed Something went wrong. Please try again.subscribeCongratulations! You’re all set!last_img read more