Skip to main content

2011 | OriginalPaper | Buchkapitel

3. Policy and Law: Denial of Service Threat

verfasst von : W. J. Caelli, S. V. Raghavan, S. M. Bhaskar, J. Georgiades

Erschienen in: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A set of relevant quotes could ‘set the scene’ for research into and discussion of the policy and law aspects of DoS/DDoS against global, national and defence information infrastructures (GII, NII, DII), national critical infrastructure (CNI) and the nation state itself (Information Warfare, Cyber-warfare, Electronic Warfare).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
On 1 January 2011, the social network ‘Facebook’, based on server computers and disk storage devices, connected via the global Internet claimed a population of over 500 million ‘active members’ with over 50% making use of the network each day. Moreover, each one of those members is claimed to have an average of 130 ‘friends’. Any denial of service to this structure is now seen by many members as being of major significance, if not, catastrophic. Even small periods of downtime, as reported on 30 December 2010 by The Australian newspaper, may cause concern and frustration for its users. The question could easily be asked as to whether or not the ‘citizens’ of that ‘Internet Nation’, e.g. ‘Facebook’, and other ‘social networks’, could see DoS to the NII as simply an act of denying access by a citizen to his or her ‘home country’, their ‘homeland’. Essentially these ‘Internet’ nations are operating largely outside the constraints of the geographic nation states of the eighteenth and nineteenth centuries. They are looking for ‘governance’ from a new, private sector ‘government’, often a privately or publicly held company based in one of the traditional nation states, e.g. ‘Facebook’. The ‘citizens’ of this new ‘State’ in cyberspace could even be seen as maintaining human relationships on levels similar to the more traditional situation, e.g. maintaining a hierarchy of associations with other ‘citizens’ of the ‘State’. [16].
 
2
SMS stands for ‘Short Message Service’. ‘Wikipedia’ explains SMS as “the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices.” It forms part of the internationally accepted ‘Global System for Mobile Communications (GSM)’ standards set developed and agreed in the mid-1980s. An example is the ‘NetCode’ system of Australia’s Commonwealth Bank which is described by the bank as follows:
NetCode SMS is a free service available to all NetBank customers. It replaces Personalised Identification Questions to provide added security when completing certain NetBank transactions…Every time you perform one of these transactions, a new NetCode will be sent to your mobile phone via SMS. To complete your NetBank transaction, simply key in the 6-digit NetCode in the ‘Enter your NetCode’ field. Each NetCode number securely matches the Commonwealth Bank’s NetBank system. [6]
 
3
The term ICT stands for ‘Information and Communications Technology’. As such, it expresses the concepts of knowledge and process rather than the results of that knowledge, i.e. the artefacts or the products and systems that are created from ICT. As such, it is an expression of the knowledge and experience of humans.
 
4
The ‘tech-exclusive’ website, on 27 April 2010, reported as follows under the banner headline ‘India faces Disrupted Internet Service Due to Undersea Cable Issue’
Getting slow download speed? Well things will continue like this for the next 3 to 4 days. The slow internet speed is to be blamed on an undersea cable repair going on. The SEA-ME-WE4 undersea cable got cut a few weeks ago and is now being repaired. This cable links Europe, the Middle East and South Asia region. The worst hit country is India. This single cable carries around 89% of the traffic load of the above mentioned region. The major internet players – Bharti Airtel and Tata Communications – get their bandwidth from the same undersea cable. This is not the first time that an undersea cable cut has disrupted the internet speeds in India. In 2008, an undersea cable cut led to India losing around 50% to 60% of its internet bandwidth. [122]
 
5
A contributing author, Caelli, is the Chair of the SSAC for auDa, the Australian Domain Name Authority.
 
6
A contributing author, Caelli, has been a member of TC-11 since 1984.
 
7
The author, Caelli, was a foundation member of this group and served on it until Jan 2011.
 
8
The Internet Industry Association (IIA) is an industry organisation governed by its own constitution and by a board of directors. It maintains an operational executive group including a Chief Executive Officer based in Australia’s Federal Capital, Canberra. Its home page on the world wide web is at URL http://​www.​iia.​net.​au/​.
 
Literatur
43.
Zurück zum Zitat Trusted computer system evaluation criteria. Technical report DoD 5200.28-STD, USA Department of Defense, 26 Dec 1985. (Supersedes CSC-STD-00l-83, dated l5 Aug 83). Trusted computer system evaluation criteria. Technical report DoD 5200.28-STD, USA Department of Defense, 26 Dec 1985. (Supersedes CSC-STD-00l-83, dated l5 Aug 83).
44.
Zurück zum Zitat ISO 7498-2: 1989 Information processing systems – Open Systems Interconnection – Basic Reference Model – Part 2 Security Architecture. Technical report, International Organization for Standardization, 1989. ISO 7498-2: 1989 Information processing systems – Open Systems Interconnection – Basic Reference Model – Part 2 Security Architecture. Technical report, International Organization for Standardization, 1989.
46.
52.
Zurück zum Zitat United Nations Handbook: 2009–2010: An Annual Guide for those Working with and within the United Nations. United Nations Publications, 308–314. United Nations Handbook: 2009–2010: An Annual Guide for those Working with and within the United Nations. United Nations Publications, 308–314.
65.
Zurück zum Zitat Ahmed, M. 2011. Driving the engine of success. The Australian, 26, 08 Jan 2011. Ahmed, M. 2011. Driving the engine of success. The Australian, 26, 08 Jan 2011.
66.
Zurück zum Zitat Alvestrand, H. 2004. A mission statement for the IETF: RFC 3935. Technical report, IETF Network Working Group. Alvestrand, H. 2004. A mission statement for the IETF: RFC 3935. Technical report, IETF Network Working Group.
70.
Zurück zum Zitat Ball, D. 2008. Australia and cyber-warfare, Chap. 6: An Australian Cyber-warfare Centre, 119–148. ANU, Canberra. Ball, D. 2008. Australia and cyber-warfare, Chap.​ 6: An Australian Cyber-warfare Centre, 119–148. ANU, Canberra.
75.
Zurück zum Zitat Caelli, W. 2010. Towards the digital city: Information assurance and resilience policy. In Proceedings of the Hong Kong Institute of Engineers (HKIE) Conference “The Way to the Digital City – Sustainable Public Services and Solutions”, Hong Kong – SAR, PRC, 1–2 Nov 2010. Caelli, W. 2010. Towards the digital city: Information assurance and resilience policy. In Proceedings of the Hong Kong Institute of Engineers (HKIE) Conference “The Way to the Digital City – Sustainable Public Services and Solutions”, Hong Kong – SAR, PRC, 1–2 Nov 2010.
77.
Zurück zum Zitat Carr, J. 2010. Inside cyber warfare: Mapping the cyber underworld. Sebastopol: O’Reilly. Carr, J. 2010. Inside cyber warfare: Mapping the cyber underworld. Sebastopol: O’Reilly.
78.
Zurück zum Zitat Carr, N. 2009. The big switch: Rewiring the world, from Edison to Google. New York: W.W. Norton & Co. Carr, N. 2009. The big switch: Rewiring the world, from Edison to Google. New York: W.W. Norton & Co.
81.
Zurück zum Zitat Christensen, S., W. Caelli, W. Duncan, and E. Georgiades. 2010. An Achilles heel: Denial of service on Australian critical information infrastructure. Information and Communications Technology Law 19(1): 61–85. Christensen, S., W. Caelli, W. Duncan, and E. Georgiades. 2010. An Achilles heel: Denial of service on Australian critical information infrastructure. Information and Communications Technology Law 19(1): 61–85.
83.
Zurück zum Zitat Clarke, R. and R.K. Knake. 2010. Cyber war: The next threat to national security and what to do about it. New York: HarperCollins. Clarke, R. and R.K. Knake. 2010. Cyber war: The next threat to national security and what to do about it. New York: HarperCollins.
85.
Zurück zum Zitat Creedy, S. and F. Foo. 2010. Virgin brand feeling a bit blue after computer glitch. The Australian, 25, 9 OCtober 2010. Creedy, S. and F. Foo. 2010. Virgin brand feeling a bit blue after computer glitch. The Australian, 25, 9 OCtober 2010.
86.
Zurück zum Zitat de Villiers, M. 2007. Distributed denial of service: Law technology and policy. Sydney: University of New South Wales, School of Law. de Villiers, M. 2007. Distributed denial of service: Law technology and policy. Sydney: University of New South Wales, School of Law.
87.
Zurück zum Zitat Dudgeon, I. 2008. Australia and cyber-warfare, chapter 4: Targeting Information Infrastructures, 59–83. Canberra: ANU. Dudgeon, I. 2008. Australia and cyber-warfare, chapter 4: Targeting Information Infrastructures, 59–83. Canberra: ANU.
88.
Zurück zum Zitat Dyer, J.G., M. Lindemann, R. Perez, L. van Doorn, S.W. Smith, and S. Weingart. 2001. Building the IBM 4758 secure coprocessor. IEEE Computer, 57–66, Oct 2001. Dyer, J.G., M. Lindemann, R. Perez, L. van Doorn, S.W. Smith, and S. Weingart. 2001. Building the IBM 4758 secure coprocessor. IEEE Computer, 57–66, Oct 2001.
89.
Zurück zum Zitat Dyson, E. 1997. Release 2.0: A design for living in the digital age. Viking/Penguin. Dyson, E. 1997. Release 2.0: A design for living in the digital age. Viking/Penguin.
93.
Zurück zum Zitat Georgiades, E. Crisis on impact: Responding to cyber attacks on critical information infrastructures. In preparation. Georgiades, E. Crisis on impact: Responding to cyber attacks on critical information infrastructures. In preparation.
94.
Zurück zum Zitat Graham, W.R., J.S. Jr. Foster, E. Gjelde, R.J. Hermann, H.M. Kluepfel, R.L. Lawson, G.K. Soper, L.L. Jr. Wood, and J.B. Woodard. 2004. Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack : Volume 1: Executive report. Technical report. http://empcommission.org/docs/empc_exec_rpt.pdf. Accessed 2 Feb 2011. Graham, W.R., J.S. Jr. Foster, E. Gjelde, R.J. Hermann, H.M. Kluepfel, R.L. Lawson, G.K. Soper, L.L. Jr. Wood, and J.B. Woodard. 2004. Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack : Volume 1: Executive report. Technical report. http://​empcommission.​org/​docs/​empc_​exec_​rpt.​pdf. Accessed 2 Feb 2011.
104.
Zurück zum Zitat Jingfei, S. 2009. Solution–Mitigating interference between LTE and 2G/3G networks. Technical report. Jingfei, S. 2009. Solution–Mitigating interference between LTE and 2G/3G networks. Technical report.
106.
Zurück zum Zitat Kitney, D. 2011. The web whirlwind. The Weekend Australian, 1, 8 Jan 2011. Kitney, D. 2011. The web whirlwind. The Weekend Australian, 1, 8 Jan 2011.
107.
Zurück zum Zitat Koch, C. 1995. Mutable markets. CIO Magazine 9(5): 68–76. Koch, C. 1995. Mutable markets. CIO Magazine 9(5): 68–76.
108.
Zurück zum Zitat Kramer, F.D., S.H. Starr, and L.K. Wentz, eds. 2009. Cyberpower and national security. Washington, DC: Center for Technology and National Security Policy. Kramer, F.D., S.H. Starr, and L.K. Wentz, eds. 2009. Cyberpower and national security. Washington, DC: Center for Technology and National Security Policy.
110.
Zurück zum Zitat Libicki, M. 2007. Conquest in cyberspace: National security and information warfare. Cambridge: Cambridge University Press. Libicki, M. 2007. Conquest in cyberspace: National security and information warfare. Cambridge: Cambridge University Press.
111.
Zurück zum Zitat Loscocco, P. and S. Smalley. 2001. Integrating flexible support for security policies into the Linux operating system. In 2001 USENIX Annual Technical Conference Boston, 25–30 Jun 2001. USENIX. Loscocco, P. and S. Smalley. 2001. Integrating flexible support for security policies into the Linux operating system. In 2001 USENIX Annual Technical Conference Boston, 25–30 Jun 2001. USENIX.
115.
123.
Zurück zum Zitat Rattray, G. 2001. Strategic warfare in cyberspace. Cambridge: The MIT Press. Rattray, G. 2001. Strategic warfare in cyberspace. Cambridge: The MIT Press.
127.
Zurück zum Zitat Schwartau, W. 1996. Information warfare, 2nd edn. New York: Thunder’s Mouth Press. Schwartau, W. 1996. Information warfare, 2nd edn. New York: Thunder’s Mouth Press.
128.
Zurück zum Zitat Singh, H., A. Soni, and R. Kathuria. 2003. Telecom policy reform in India, chapter 4. World Bank and Oxford University Press. Singh, H., A. Soni, and R. Kathuria. 2003. Telecom policy reform in India, chapter 4. World Bank and Oxford University Press.
134.
Zurück zum Zitat Waters, G., D. Ball, and I. Dudgeon. 2008. Australia and cyber-warfare. Canberra: ANU Press. Waters, G., D. Ball, and I. Dudgeon. 2008. Australia and cyber-warfare. Canberra: ANU Press.
138.
Zurück zum Zitat Wingfield, T. 2009. Cyberpower and national security, Chapter 22: International law and information operations. National Defense University Press. Wingfield, T. 2009. Cyberpower and national security, Chapter 22: International law and information operations. National Defense University Press.
139.
Zurück zum Zitat Zakaria, F. 2008. The post American world. New York: W.W. Norton & Company. Zakaria, F. 2008. The post American world. New York: W.W. Norton & Company.
Metadaten
Titel
Policy and Law: Denial of Service Threat
verfasst von
W. J. Caelli
S. V. Raghavan
S. M. Bhaskar
J. Georgiades
Copyright-Jahr
2011
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-0277-6_3

Neuer Inhalt