Matches in SemOpenAlex for { <https://semopenalex.org/work/W2992770545> ?p ?o ?g. }
Showing items 1 to 56 of
56
with 100 items per page.
- W2992770545 startingPage "7" @default.
- W2992770545 abstract "At 7:45 a.m. on Monday, April 8, 2013, 23,000 network users in the Rowan-Salisbury School System's 35 schools were accessing their Web-based curriculum resources and administrative applications when suddenly all Internet connectivity stopped. The outage lasted for about an hour. Teachers had to quickly switch their lessons to a Plan B, since most had components that required Internet access. Internet connectivity returned briefly, but suddenly went down again for another hour. The Internet would go down for a third time before school ended. The Internet outages weren't due to hardware failures, Internet provider outages or network maintenance. The school district was under attack--specifically, we were experiencing a distributed denial-of-service attack, or DDoS. DDoS attacks, one of the most common forms of cyberattack, are designed to overwhelm a targeted IP address with numerous network requests in order to interrupt or suspend network service. Each morning for the next four days, the district lost Internet connectivity around 7:45 a.m. The Internet would remain down for about an hour and would go down two more times each day. [ILLUSTRATION OMITTED] During the next three weeks, the school system was attacked multiple times a day on eight different days. Each attack caused a loss of Internet connectivity. A great frustration among students and staff ensued. Teaching and learning was being significantly impacted. Identifying the Problem The school system's Internet connection was a 1 Gb connection. It was provided by the state of North Carolina as part of the North Carolina Research and Education Network (NCREN). This network serves all the state's public education facilities, as well as many private colleges and universities and the NC Office of Information Technology. The NCREN system is managed by MCNC, a nonprofit organization. During the three weeks of Internet outages, numerous conversations took place between the MCNC staff and the district's technology department. It wasn't until the third day of Internet outages that MCNC identified DDoS attacks as the cause of the outages. Data analysis showed that the district's network was being attacked with as much as 6.4 Gb per second. The attack was focused on the public IP of the district's firewall. The purpose of the attack was to disrupt Internet connectivity to and from the school district. Unfortunately, MCNC wasn't able to stop the DDoS attack at the perimeter of the NCREN Internet connection. Stopping the DDoS attack at the perimeter is essential to mitigate its effect on a network. Instead, MCNC implemented several measures to try to mitigate the attacks. These helped preserve connectivity for the other organizations sharing the network connection line with Rowan-Salisbury, but Internet connectivity for the district continued to be disrupted. The district got some help from a retired 3Com/HP network engineer, Larry Tolbert. He had more than 30 years of network engineering experience and was very familiar with Rowan-Salisbury's network. After the district leveraged several of its infrastructure components to obtain additional information about the DDoS attack and to block the attack at the perimeter of the district's network, Tolbert configured the district's TippingPoint Intrusion Protection System (IPS) to capture packet data of future attacks for analysis. He also configured the IPS to prevent future attacks from reaching the district's firewall and to send alerts to the technology department at the start of any future attack. As we discovered, the DDoS attacks were coming from hundreds of malware-infected, remotely controlled computers located all over the world. This made it difficult to determine the responsible person, but the district needed to try. Calling the Cops The next step was to get help from local law enforcement. Sgt. Detective Roger Hosey, who worked with the FBI's Cyber Taskforce and had previously worked as a school district technology technician, knew the system and its network, so he was well-suited to respond to the situation. …" @default.
- W2992770545 created "2019-12-13" @default.
- W2992770545 creator A5015593972 @default.
- W2992770545 date "2014-05-01" @default.
- W2992770545 modified "2023-09-28" @default.
- W2992770545 title "How to Survive a Cyberattack: Here's How a North Carolina District Responded to a Denial-of-Service Attack That Came from One of Its Own Schools" @default.
- W2992770545 hasPublicationYear "2014" @default.
- W2992770545 type Work @default.
- W2992770545 sameAs 2992770545 @default.
- W2992770545 citedByCount "0" @default.
- W2992770545 crossrefType "journal-article" @default.
- W2992770545 hasAuthorship W2992770545A5015593972 @default.
- W2992770545 hasConcept C108827166 @default.
- W2992770545 hasConcept C110875604 @default.
- W2992770545 hasConcept C136764020 @default.
- W2992770545 hasConcept C38652104 @default.
- W2992770545 hasConcept C38822068 @default.
- W2992770545 hasConcept C41008148 @default.
- W2992770545 hasConcept C83849155 @default.
- W2992770545 hasConceptScore W2992770545C108827166 @default.
- W2992770545 hasConceptScore W2992770545C110875604 @default.
- W2992770545 hasConceptScore W2992770545C136764020 @default.
- W2992770545 hasConceptScore W2992770545C38652104 @default.
- W2992770545 hasConceptScore W2992770545C38822068 @default.
- W2992770545 hasConceptScore W2992770545C41008148 @default.
- W2992770545 hasConceptScore W2992770545C83849155 @default.
- W2992770545 hasIssue "5" @default.
- W2992770545 hasLocation W29927705451 @default.
- W2992770545 hasOpenAccess W2992770545 @default.
- W2992770545 hasPrimaryLocation W29927705451 @default.
- W2992770545 hasRelatedWork W1527762547 @default.
- W2992770545 hasRelatedWork W192259747 @default.
- W2992770545 hasRelatedWork W221840959 @default.
- W2992770545 hasRelatedWork W227221520 @default.
- W2992770545 hasRelatedWork W243691249 @default.
- W2992770545 hasRelatedWork W246146256 @default.
- W2992770545 hasRelatedWork W249207523 @default.
- W2992770545 hasRelatedWork W250409221 @default.
- W2992770545 hasRelatedWork W2595584298 @default.
- W2992770545 hasRelatedWork W260965188 @default.
- W2992770545 hasRelatedWork W2771559671 @default.
- W2992770545 hasRelatedWork W289044040 @default.
- W2992770545 hasRelatedWork W296625092 @default.
- W2992770545 hasRelatedWork W297161705 @default.
- W2992770545 hasRelatedWork W2978857959 @default.
- W2992770545 hasRelatedWork W2993936926 @default.
- W2992770545 hasRelatedWork W301381734 @default.
- W2992770545 hasRelatedWork W3188914780 @default.
- W2992770545 hasRelatedWork W3203516098 @default.
- W2992770545 hasRelatedWork W8920777 @default.
- W2992770545 hasVolume "41" @default.
- W2992770545 isParatext "false" @default.
- W2992770545 isRetracted "false" @default.
- W2992770545 magId "2992770545" @default.
- W2992770545 workType "article" @default.