Intro2008 - Information warfare A bit of history In 1988...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Information warfare
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
A bit of history In 1988 Morris released a program which succeeded in infecting thousands of Unix hosts on the Internet. One of the methods Morris used to gain access to a vulnerable system was a buffer overflow bug in the fingerd daemon. Once it gained access to a vulnerable system, Morris's program installed itself on the machine, and used several methods to attempt to spread itself to other machines. The original intent of Morris was to spread to other systems relatively slowly and undetected, without causing a significant disruption on any of the affected machines. R. Morris
Background image of page 2
Effort Needed to Disrupt Systems is Decreasing low Knowledge Required 1980 1985 1990 1995 password guessing password cracking disabling audits hijacking sessions diagnostics stealth diagnostics packet spoofing sniffers self replicating code exploiting known vulnerabilities back doors GUI high Tools Attackers packet protocol DOS attack Sophistication of Attack 2000
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Metaphore for the internet?
Background image of page 4
Leonard Kleinrock He has described this work as: "Basically, what I did for my PhD research in 1961–1962 was to establish a mathematical theory of packet networks . .." His theoretical work on hierarchical routing, done in the late 1970s with his then-student Farouk Kamoun , is now critical to the operation of today's world-wide Internet
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Robert Kahn Vinton Cerf
Background image of page 6
1994 introduction of Classless InterDomain Routing ( CIDR )
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Someone had to keep track of all the protocols, the identifiers, networks and addresses and ultimately the names of all the things in the networked universe. And someone had to keep track of all the information that erupted with volcanic force from the intensity of the debates and discussions and endless invention that has continued unabated for 30 years. That someone was Jonathan B. Postel, our Internet Assigned Numbers Authority, friend, engineer, confidant, leader, icon, and now, first of the giants to depart from our midst. Jon Postel , Director of the Computer Networks Division at the Information Sciences Institute at the University of Southern California, took over stewardship of the RFCs in the early 1970's. He served
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 05/12/2008 for the course EPP 19601 taught by Professor Morel during the Spring '08 term at Carnegie Mellon.

Page1 / 35

Intro2008 - Information warfare A bit of history In 1988...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online