Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

Web-based attacks could create chaos in the physical world

02.05.2003


Computer security researchers suggest ways to thwart new form of cybercrime



Most experts on computer crime focus on attacks against Web servers, bank account tampering and other mischief confined to the digital world. But by using little more than a Web search engine and some simple software, a computer-savvy criminal or terrorist could easily leap beyond the boundaries of cyberspace to wreak havoc in the physical world, a team of Internet security researchers has concluded.

At a recent Association for Computing Machinery conference on privacy in an electronic society, the researchers -- including a Johns Hopkins faculty member -- described how automated order forms on the Web could be exploited to send tens of thousands of unwanted catalogs to a business or an individual. Such an onslaught would not only pose problems for the victim, but it could also paralyze the local post office charged with making such deliveries, the researchers suggested. After explaining how such attacks could take place, the researchers proposed several technological "fixes" that could help prevent them.


The rapid growth of the World Wide Web has enabled many merchants, government agencies and non-profit organizations to make sales catalogs and information packets available to anyone who can fill out a simple on-line form. But these forms, the researchers say, have also opened a gateway that could allow disruptive activity to spill out of cyberspace. "People have not considered how easily someone could leverage the scale and automation of the Internet to inflict damage on real-world processes," said Avi Rubin, technical director of the Information Security Institute at The Johns Hopkins University and one of the authors of the paper.

Rubin and two other researchers first determined that a popular search engine such as Google could be used to locate online order forms. They also discovered that simple software could be launched to automatically recognize and fill in fields such as "name," "address" and "city," and then submit the catalog request online. "It could be set up to send 30,000 different catalogs to one person or 30,000 copies of one catalog to 30,000 different recipients," said Rubin. "This could create a great expense for the sender, a huge burden for local postal facilities and chaos in the mail room of a business targeted to receive this flood of materials."

The technique could also be used to exploit the increasingly common Web-based forms used to request repair service, deliveries or parcel pickups, said Rubin, who also is an associate professor in the Department of Computer Science at Johns Hopkins. Tracking down the attacker could be difficult, he added. The offender could easily escape detection by loading the program onto a floppy disk or a small USB hard disk and paying cash for a few minutes of time at an Internet café. By the time the damage was discovered, the culprit would have vanished, Rubin said.

Because of the confusion and costs such attacks could inflict, Rubin and his fellow researchers wondered whether they should make public the technological weakness they’d uncovered; by doing so, they might provide a "blueprint" for people to launch such attacks. With this in mind, they did not publish their paper for some time after the initial research was done. However, after a popular search engine introduced its new Application Programming Interfaces, the researchers concluded that the attacks they envisioned were now much more likely to occur. In their paper they stated that "there is also a risk in not disclosing vulnerabilities for which there are known solutions. By not educating people who are in a position to defend against an attack, it can be more damaging to bury knowledge of a vulnerability than to announce it."

The researchers suggested several methods to deter the attacks they described. One is to set up online forms so that they cannot easily be picked up by a search engine. Another is to alter the HTML coding used to create an online form so that it no longer contains easily recognizable field names such as "name" and "address." (Such coding changes would not be visible to the person filling out the form.)

Yet another option is to include in each form a step that must be completed by a human computer user. This process, called a Reverse Turing Test, could display writing that could not easily be recognized by a computer, or it could require some other visual task that would trip up an automated ordering program. Other deterrents suggested by the researchers include client puzzles and monitored systems called "Honeypots," which are set up to attract cyber-attackers for early detections.

Hoping to prevent the type of cyber-attacks they’ve envisioned, the researchers have conferred with a top technology administrator from the U.S. Postal Service and have made their concerns and recommendations public on the Web. "To prevent these damaging activities," Rubin said, "we need to look at the interface between cyberspace and the real world and to make sure there is a real person submitting a legitimate request, not a computer program launching a disruptive attack."

Phil Sneiderman | EurekAlert!
Further information:
http://www.jhu.edu/
http://www.avirubin.com/scripted.attacks.pdf
http://www.avirubin.com

More articles from Information Technology:

nachricht Smart Computers
21.08.2017 | Albert-Ludwigs-Universität Freiburg im Breisgau

nachricht AI implications: Engineer's model lays groundwork for machine-learning device
18.08.2017 | Washington University in St. Louis

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: Fizzy soda water could be key to clean manufacture of flat wonder material: Graphene

Whether you call it effervescent, fizzy, or sparkling, carbonated water is making a comeback as a beverage. Aside from quenching thirst, researchers at the University of Illinois at Urbana-Champaign have discovered a new use for these "bubbly" concoctions that will have major impact on the manufacturer of the world's thinnest, flattest, and one most useful materials -- graphene.

As graphene's popularity grows as an advanced "wonder" material, the speed and quality at which it can be manufactured will be paramount. With that in mind,...

Im Focus: Exotic quantum states made from light: Physicists create optical “wells” for a super-photon

Physicists at the University of Bonn have managed to create optical hollows and more complex patterns into which the light of a Bose-Einstein condensate flows. The creation of such highly low-loss structures for light is a prerequisite for complex light circuits, such as for quantum information processing for a new generation of computers. The researchers are now presenting their results in the journal Nature Photonics.

Light particles (photons) occur as tiny, indivisible portions. Many thousands of these light portions can be merged to form a single super-photon if they are...

Im Focus: Circular RNA linked to brain function

For the first time, scientists have shown that circular RNA is linked to brain function. When a RNA molecule called Cdr1as was deleted from the genome of mice, the animals had problems filtering out unnecessary information – like patients suffering from neuropsychiatric disorders.

While hundreds of circular RNAs (circRNAs) are abundant in mammalian brains, one big question has remained unanswered: What are they actually good for? In the...

Im Focus: RAVAN CubeSat measures Earth's outgoing energy

An experimental small satellite has successfully collected and delivered data on a key measurement for predicting changes in Earth's climate.

The Radiometer Assessment using Vertically Aligned Nanotubes (RAVAN) CubeSat was launched into low-Earth orbit on Nov. 11, 2016, in order to test new...

Im Focus: Scientists shine new light on the “other high temperature superconductor”

A study led by scientists of the Max Planck Institute for the Structure and Dynamics of Matter (MPSD) at the Center for Free-Electron Laser Science in Hamburg presents evidence of the coexistence of superconductivity and “charge-density-waves” in compounds of the poorly-studied family of bismuthates. This observation opens up new perspectives for a deeper understanding of the phenomenon of high-temperature superconductivity, a topic which is at the core of condensed matter research since more than 30 years. The paper by Nicoletti et al has been published in the PNAS.

Since the beginning of the 20th century, superconductivity had been observed in some metals at temperatures only a few degrees above the absolute zero (minus...

All Focus news of the innovation-report >>>

Anzeige

Anzeige

Event News

Call for Papers – ICNFT 2018, 5th International Conference on New Forming Technology

16.08.2017 | Event News

Sustainability is the business model of tomorrow

04.08.2017 | Event News

Clash of Realities 2017: Registration now open. International Conference at TH Köln

26.07.2017 | Event News

 
Latest News

Nagoya physicists resolve long-standing mystery of structure-less transition

21.08.2017 | Materials Sciences

Chronic stress induces fatal organ dysfunctions via a new neural circuit

21.08.2017 | Health and Medicine

Scientists from the MSU studied new liquid-crystalline photochrom

21.08.2017 | Materials Sciences

VideoLinks
B2B-VideoLinks
More VideoLinks >>>