It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


The New Cyberweapon that could take down the internet.

page: 1

log in


posted on Feb, 16 2011 @ 02:29 PM
Thankfully it was engineered by University students so at the moment its safe, However its only a matter of time before somebody sythesises it i imagine.

Heres some info:

A new cyberweapon could take down the entire internet – and there's not much that current defences can do to stop it. So say Max Schuchard at the University of Minnesota in Minneapolis and his colleagues, the masterminds who have created the digital ordnance. But thankfully they have no intention of destroying the net just yet. Instead, they are suggesting improvements to its defences.

Schuchard's new attack pits the structure of the internet against itself. Hundreds of connection points in the net fall offline every minute, but we don't notice because the net routes around them. It can do this because the smaller networks that make up the internet, known as autonomous systems, communicate with each other through routers. When a communication path changes, nearby routers inform their neighbours through a system known as the border gateway protocol (BGP). These routers inform other neighbours in turn, eventually spreading knowledge of the new path throughout the internet.

A previously discovered method of attack, dubbed ZMW – after its three creators Zhang, Mao and Wang, researchers in the US who came up with their version four years ago – disrupts the connection between two routers by interfering with BGP to make it appear that the link is offline. Schuchard and colleagues worked out how to spread this disruption to the entire internet and simulated its effects.
Surgical strike

The attack requires a large botnet – a network of computers infected with software that allows them to be externally controlled: Schuchard reckons 250,000 such machines would be enough to take down the internet. Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.

"Normal DDoS is a hammer; this is more of a scalpel," says Schuchard. "If you cut in the wrong places then the attack won't work."

An attacker deploying the Schuchard cyberweapon would send traffic between computers in their botnet to build a map of the paths between them. Then they would identify a link common to many different paths and launch a ZMW attack to bring it down. Neighbouring routers would respond by sending out BGP updates to reroute traffic elsewhere. A short time later, the two sundered routers would reconnect and send out their own BGP updates, upon which attack traffic would start flowing in again, causing them to disconnect once more. This cycle would repeat, with the single breaking and reforming link sending out waves of BGP updates to every router on the internet. Eventually each router in the world would be receiving more updates than it could handle – after 20 minutes of attacking, a queue requiring 100 minutes of processing would have built up.

Clearly, that's a problem. "Routers under extreme computational load tend to do funny things," says Schuchard. With every router in the world preoccupied, natural routing outages wouldn't be fixed, and eventually the internet would be so full of holes that communication would become impossible. Shuchard thinks it would take days to recover.

"Once this attack got launched, it wouldn't be solved by technical means, but by network operators actually talking to each other," he says. Each autonomous system would have to be taken down and rebooted to clear the BGP backlog.
Meltdown not expected

So is internet meltdown now inevitable? Perhaps not. The attack is unlikely to be launched by malicious hackers, because mapping the network to find a target link is a highly technical task, and anyone with a large enough botnet is more likely to be renting it out for a profit.

An alternative scenario would be the nuclear option in a full-blown cyberwar – the last resort in retaliation to other forms of cyberattack. A nation state could pull up the digital drawbridge by adjusting its BGP to disconnect from the internet, just as Egypt did two weeks ago. An agent in another country could then launch the attack, bringing down the internet while preserving the attacking nation's internal network.
Sitting duck

Whoever launched the attack, there's little we could do about it. Schuchard's simulation shows that existing fail-safes built into BGP do little to protect against his attack – they weren't designed to. One solution is to send BGP updates via a separate network from other data, but this is impractical as it would essentially involve building a shadow internet.

Another is to alter the BGP system to assume that links never go down, but this change would have to be made by at least 10 per cent of all autonomous systems on the internet, according to the researchers' model, and would require network operators to monitor the health of connections in other ways. Schuchard says that convincing enough independent operators to make the change could be difficult.

"Nobody knows if it's possible to bring down the global internet routing system," says Mark Handley, an expert in networked systems at University College London. He suggests that the attack could cause "significant disruption" to the internet, with an effect greater than the Slammer worm of 2003, but it is unlikely to bring the whole thing down.

"The simulations in the paper make a lot of simplifying assumptions, which is necessary to simulate on this scale," he explains. "I doubt the internet would behave as described."

Schuchard and colleagues presented their findings at the Network and Distributed System Security Symposium in San Diego, California, on Tuesday.

With a hope suitable defenses will be made to defend against this sort of cyber weapon as it identifies a strong weakness in the current Net and frankly makes Stuxnet look like a Childs toy

edit on 16/2/11 by TedHodgson because: (no reason given)

posted on Feb, 16 2011 @ 02:34 PM
Wasn't there something on the Onion website about how an internet outage happened and caused catastrophic productivity?

edit on 16/2/2011 by chr0naut because: (no reason given)

posted on Feb, 16 2011 @ 02:37 PM
reply to post by chr0naut

Quite Possibly! Allthought i have not read the Onion in a while

posted on Feb, 16 2011 @ 05:35 PM
reply to post by TedHodgson

once ipv6 comes out/is mainstream it wont be a problem
as well as most other hacking. Every device, cell phones, printers, routers, computer, laptops, security cameras, really any technology that is "networked" will have an IP address. It will be much harder to get away with stuff then.

posted on Feb, 16 2011 @ 05:56 PM
This is neither a 'cyber'- weapon nor anything new.

Indirect DDOS attacks are something that has been around. Sane configuration settings and firewalls help.

PS: Also I'm against the the verbal abuse of the prefix 'Cyber' - pun intended

edit on 16-2-2011 by kybertech because: duh

posted on Feb, 16 2011 @ 06:04 PM
reply to post by VonDoomen

This works at a fairly low level. I'm pretty sure that it would kill IPv6 addresses off routing tables too.

posted on Feb, 16 2011 @ 06:07 PM
reply to post by chr0naut

let me correct
well what I was trying to point out is with IPSEC, it will be much much harder to get away with nefarious activity online. Im trying to say that hopefully it will be a deterrent for this type of activity. And yea your probly right, IPV4 or 6, it would still mess with it, although thats my assumption, I dont know for sure.

Im just going on what my professor told me yesterday, along the lines of hacking will be much more challenging on the new network.

posted on Feb, 16 2011 @ 06:12 PM
reply to post by kybertech

Although I agree this has nothing to cybernetics, no amount of firewall will make your internet work if the routers forwarding data to your PC don't believe that you exist and throw away any communication sent your way.

And it's not IP address based. Its lower level than that. The physical MAC address of your network card is made to appear invalid (not actually invalid, but the router through which the data flows is made to appear offline), not on your PC, but on the routers transmitting the data.

Basically you'd be off the net and unable to get back on because you cannot talk to the routers to get back on.
edit on 16/2/2011 by chr0naut because: (no reason given)

edit on 16/2/2011 by chr0naut because: (no reason given)

posted on Feb, 17 2011 @ 03:17 PM

Originally posted by chr0naut
reply to post by kybertech
And it's not IP address based. Its lower level than that. The physical MAC address of your network card is made to appear invalid (not actually invalid, but the router through which the data flows is made to appear offline), not on your PC, but on the routers transmitting the data.

I don't see anything on mac adresses, but anyway part of BGP (the part which doesn't goes over the local net apparently ) is based on plain TCP/IP.
A decent firewall also does more than plain package ip filtering it can go up to application level.

new topics

top topics


log in