SLIDE 3 3
High Low 1 9 8 0 1 9 8 5 1 9 9 0 1 9 9 5 2 0 0 0
pas passw or
d gu guessin ing self-repli plicat at ing c g code
pas passw or
d crac ackin ing exploit ploit ing k g know
lnerabili abilit ies dis disabli abling au g audit dit s bac back door doors hij ac acking g se sessi ssions sw eeper ers sniffers pac packet spoof poofin ing GUI au aut om
at ed d pr probe
ans de denial of ial of service w w w w w w at at t ac acks
At t a t t acks At t a t t ackers
“ st ealt alt h” / adv advan anced d scanni nning ng t echni hnique ues bu burglar glarie ies net w or
gm t . diagn diagnos
ics DDO DDOS at at t ac acks
2 0 xx…
Bot Net s Em be bedde dded d m al alic iciou
code
(Source: Adapted from Lipson, H. F., Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, Special Report CMS/SEI-2002-SR-009, November 2002. (CERT)
Attack sophistication vs. attacker expertise
Required attacker expertise Available attack sophistication
TARGETED ATTACKS a.k.a. ADVANCED PERSISTENT THREATS