Forensics Journal - Stevenson University 2015 | Page 22
STEVENSON UNIVERSITY
Disruption or destruction of these vital services poses serious risks to
both national security and economic viability. In order to combat the
threat of a major cyber terrorist attack the United States consistently
must be one step ahead of its hacking adversaries by identifying and
countering malicious intrusion capabilities and employing the most
up-to-date, real-time detection and deflection techniques in daily
operations. Individuals in the cyber security field believe that “we’re
just in the eye of the storm” and, if correct, these precautions must
be taken immediately (Hoffman, 2014, p. 1).
attack reported was 100 Gbps (gigabits per second, a measurement
of internet traffic). In 2013, an attack referred to as the “attack
that almost broke the Internet” reached 300 Gbps, and in 2014,
there have been multiple reports of attacks reaching, and possibly
surpassing, the 400 Gbps mark (Gilbert, 2014). Experts also
predict that within the next year there will be a DDoS attack
doubling what has already been witnessed (Gilbert, 2014). In
only three years, there has been an 800% increase in the “bogus”
traffic DDoS generate, meaning the forecasts for the near future
could undoubtedly wreak havoc on America’s critical infrastructure
operations and information technology.
A CLOSER LOOK AT THE THREAT
Understanding severity of the cyber threat and develop techniques
that eliminate or lessen the impact of a major cyber attack on
America’s vital assets, involves greater knowledge of this weapon.
Malicious software or malware is essentially a cyber predator. It
is deployed with the intention of causing damage to and through
computer systems (Malware Definition, 2006). The impending assault
on critical infrastructure is one in which a particular type of malware
will be utilized i.e. a Botnet Distributed Denial of Service (DDoS)
attack. In recent years, American businesses have seen the effects of
these attacks, especially where financial transactions are involved
and information can be obtained for the attacker’s personal gain.
However, “more recent research found that ideologically motivated
DDoS attacks are on the rise” (Botnet DDoS Attacks, 2014). For a
terrorist or terrorist group seeking to penetrate the data networks of
power plants or water facilities thus controlling their operations to
deny services to Americans, a DDoS attack provides the perfect means
to do so.
Most modern DDoS attacks are “zero-day or zero-hour” attacks
(Holtfreter & Harrington, 2014, p. 33). These attacks exploit
vulnerabilities by using poly [ܜX