So long, and thanks for only using readily available scripts

نویسندگان

  • Hannes Holm
  • Teodor Sommestad
چکیده

There is a general belief that it has become easier to conduct cyber attacks and that little skill or knowledge is required to compromise systems. In particular, it is often argued that the technical expertise required to mount successful cyber attacks is declining as a consequence of new offensive resources, such as attack scripts and userfriendly attack execution tools, becoming available in the public domain. These resources include, for example, exploit databases such as Packet Storm and Exploit Database, and attack execution frameworks such as Metasploit, Armitage and BurpSuite. This theory is in referenced by various works in the cyber security domain. For example, Liu and Chen (Liu & Cheng 2009) state that “attack tools and techniques have become increasingly automated and sophisticated over the past decade, whereas the technical knowledge and skills required to use these tools has decreased dramatically”. The same trend is described by the NATO (Robinson 2016), among others. Liu and Chen (Liu & Cheng 2009) even suggests that “all it takes is the basic ability to follow instructions and push buttons”. An attacker with this low level of skill, knowledge or ambition is often referred to as a “script kiddie”. Simmonds et al. (Simmonds et al. 2004) refer to a script kiddie as “someone who uses already established and part automated techniques in attacking a system”; Hald and Pedersen (Hald & Pedersen 2012) refer to the script kiddie as “one who relies on premade exploit programs and files ("scripts") to conduct his hacking, and refuses to bother to learn how they work”. Most other taxonomies and ontologies that characterize hackers describe script kiddies similarly (Rogers 2006). The idea that script kiddies and other novice cyber criminals represent an increasing threat due to the increased sophistication and automation is widespread and influence decision making on many different levels. For example, ENISA (Lévy-Bencheton et al. 2015) considers the script kiddie as threat agent that can realize some 30 different cyber threats and are, with the exception of physical attacks, relevant to the same type of threats as nation states. Others’ have suggested that anybody could use exploit kits to steal online banking credentials (Choo 2011). The present paper aims to analyze whether unsophisticated cyber attacks that a typical script kiddie is able to perform actually pose a threat to systems today. This is summarized by the research question (RQ) stated below:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Method for Assessment of Engineering Drawing Answer Scripts Using Fuzzy Logic

Popular method for assessment of final exam answer scripts in university and among the engineering drawing answer scripts based on absolute true or false judgment and assigning a single number or letter to answer of each problem cannot be so fair. To obtain a fair assessment method, we considered “imagination”, “accuracy”, “drawing” and “innovation” that are objectives of engineering dra...

متن کامل

Shelf Life Prediction of Infant Formula by Using Rancidity Test

Infant formula has a fatty acid composition that meets the needs of the neonates for unsaturated fatty acids.These fatty acids are of major importance during this period of life in which the brain and retina are developing, and will therefore have an influence upon visual acuity and learning abilities. Oxygen reacts readily with unsaturated fatty acids, so that every time these compounds are ha...

متن کامل

Shelf Life Prediction of Infant Formula by Using Rancidity Test

Infant formula has a fatty acid composition that meets the needs of the neonates for unsaturated fatty acids.These fatty acids are of major importance during this period of life in which the brain and retina are developing, and will therefore have an influence upon visual acuity and learning abilities. Oxygen reacts readily with unsaturated fatty acids, so that every time these compounds are ha...

متن کامل

Synthesis of 1,5 and 2,5-disubstituted tetrazoles using NiO nanoparticles and their evaluation as antimicrobial agents

Treatments of tetrazolate salts prepared in situ from various aldehyde; malononitrile and sodium azide in the presence of NiO nanoparticles with benzyl bromide gave the corresponding 1,5- and 2,‌5-disubstituted tetrazoles. Reaction of tetrazolate salts with 2,4′-dibromoacetophenone in the presence of NiO nanoparticles provided the corresponding 2,5-disubstituted derivatives as an only isomer. T...

متن کامل

An ANP and MULTIMOORA-Based SWOT Analysis for Strategy Formulation

Since no organization can have unlimited resources, strategists should decide on a strategy that can provide the greatest benefits to the organization. Decisions on strategy formulation commit the organization to produce specific products, work in specific markets, and exploit certain resources and technologies for a relatively long time. Strategies dictate the long-term competitive advantages ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. & Comput. Security

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2017