120 likes | 274 Views
Battles in Cyber Space. Dr Richard E Overill Department of Informatics. Nature of Warfare - Clausewitz. Violent – potentially lethal Instrumental – a means to an end Political – Intention & attribution In addition: a war is usually composed of several battles
E N D
Battles in Cyber Space Dr Richard E Overill Department of Informatics
Nature of Warfare - Clausewitz • Violent – potentially lethal • Instrumental – a means to an end • Political – Intention & attribution In addition: • a war is usually composed of several battles • a battle is usually composed of several attacks
Domains of Warfare • Land – tanks, etc. • Sea – battleships, submarines, etc. • Air – aircraft, helicopters, UAVs, etc. • Space – rockets, satellites, etc. • Cyber – computers, networks, digital infrastructure, etc. Most wars involve several domains
A definition of Information Warfare “The deliberate, unauthorised and systematic attack on critical information activities to exploit information, deny services to the authorised user, modify and corrupt data.” – UK MoD
Infrastructure Attacks “The most advanced society is really only four meals away from anarchy, and if you could attack a society through its computers to cause a breakdown of the mechanisms, the infrastructure, which cause it to run, you will bring about mass deaths.” – Stephen Badsey Royal Military Academy Sandhurst, UK
Supervisory Control And Data Acquisition(SCADA) • Monitoring and controlling: • Water purification and distribution systems • Electricity generation and distribution systems • Nuclear reprocessing plants • etc. • Typically connected to the Internet for efficiency of operation.
H(ackers)2O 8 November 2011, Springfield, IL, USA. • Hackers remotely accessed the online SCADA system of Curran-Gardner Township Public Water District. • They burned out a well pump that serviced about 2,200 households by repeatedly turning it on and off. • Later reported as a false alarm caused by a contractor remoting into the system while on holiday in Russia. 18 November 2011, Houston, TX, USA. • Pr0f hacked into Harris County water plant and took screenshots but did no damage.
“Stuxnet” • Discovered in June/July 2010. • Malicious software (“malware”) intended to sabotage nuclear reprocessing plants in Iran. • Targets and reprograms a specific model of Siemens PLC (used to control ultracentrifuges) to operate outside their specified parameters. • Replays previously sampled normal ultracentrifuge behaviour to the operators’ console. • Propagates itself and hides its code modifications • Involved 3-5 skilled person-years’ development
“Duqu” • Discovered in September 2011. • Malicious software (“malware”) intended to gatherintel such as system information and user profiles • Source code highly similar to Stuxnet yet not specifically targeting SCADA/PLC • Unknown whether it is a prequel or a sequel to Stuxnet
Questions? Ideas? • Contact Dr Richard Overill with any questions on richard.overill@kcl.ac.uk