Showing posts with label Networks. Show all posts
Showing posts with label Networks. Show all posts

Sunday, November 22, 2009

Exploit: The Dark Side of Networks

My computer's hard drive died this weekend. Although it is clearly inconvenient, and will be costly to repair/replace, it's not the end of the world. In fact, I did not lose any pertinent information to this or the other class that I am taking this semester, because all of it is stored on the web, either via this blog or files I have emailed to myself. In this case, connectivity via the internet saved my academic butt.

However, not all stories of connectivity end quite so happily. My office subscribes to Vyvx, a nation-wide fiber network that is used, among other things, to broadcast live video feeds. Their headquarters and main hub is in Tulsa, Oklahoma, pretty much the center of the US, for easy central access to the continental US. But in the spring of 2006, their basement (which contains the servers) flooded, causing the nation-wide network to go down. Since Vyvx nearly has a monopoly on the fiber connectivity world, almost every live shot for every network scheduled that day had to be canceled or re-booked with a satellite truck (if possible). Not only did Vyvx lose thousands of dollars that day, but so did the TV networks and production companies that use their service. The stations lost more than money, they lost content for their shows, which their producers had to scramble to replace at the last minute. Although Vyvx works for all of their clients 99.9% of the time, that day has been etched into the memories of all involved. It is truly an example of how "...networks fail only when they succeed. Networks cultivate the flood, but the flood is what can take down the network" (p. 96). Although the flood was not a malicious attack, it exposed the vulnerability of the Vyvx network to exploitation.

According to Merriam-Webster, to exploit is "to make productive use of , or to make use of meanly or unfairly for one's own advantage."

According to Wikipedia, an exploit is " a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized)."

In their book, The Exploit: A Theory of Networks, Galloway and Thacker emphasize that the more homogeneous network is (especially a software driven network), the easier it is to exploit, once a vulnerability has been found. And in particular, " the more Microsoft solidifies its global monopoly, the greater chance for a single software exploit to bring down the entire grid "(p. 17). Computer viruses tend to target Microsoft computers (PCs) way more often than Apple Computers (Macs) or others for this very reason.



Big computer viruses or worms come around every now and then, the latest one being the Conficker Worm, which may have just been one big April Fools joke on everyone, but it really got the Windows world in a panic, causing many patch downloads, and fearful computer users on April 1, 2009. More recent viruses are connected with the Twilight craze. And again, they only effect Windows users. These Twilight viruses exploit two overlapping groups; they exploit people who are into Twilight and they exploit Windows based computers, both of which happen to be very popular right now. Twilight fans tend (for the most part) to be younger females, who are very likely to be on the web. These fans are excited to get the inside scoop on Twilight: New Moon, which came out this week in theaters, and will be searching online for interviews with the actors and any other inside material they can find. Knowing this, hackers have created websites that will show up in search results, prompting unsuspecting fans to download viruses, thinking that they are getting interviews or a sneak peak of the movie.

Although it would be possible to exploit these groups on a case by case basis, it is made infinitely easier with the network of the World Wide Web. Web browsers are also susceptible to virus contamination, especially, you guessed it, Internet Explorer. With a usage percentage of nearly 65%, Internet Explorer is by far the most popular web browser. So, since "computer viruses thrive in environments that have low levels of diversity" (p. 84), viruses have targeted Internet Explorer much more often than Firefox and Safari, the second and third most popular browsers. The reason for this is obvious, apart from homogeneity, monopolies provide a way to use the network to the viruses' advantage and affect the largest group of people possible.

So, is the solution to vulnerability to buck the trend or get out of the network altogether? Would the relief that comes with knowing you won't have to worry about exploitation
be worth the pain of being disconnected? And even if it is, “the idea of connectivity is so highly privileged today that it is becoming more and more difficult to locate places or objects that don’t, in some way, fit into a networking rubric” (p. 26). Plus, you would lose the benefits to gained from being connected, like not losing everything you've done all semester when your computer dies, among other communication and information losses. So,maybe the simple solution (if there is one) is this: be smart. Have a contingency plan. And back up your files.

Sunday, November 15, 2009

The Science of an Infected Age

When reading this week's book, "Six Degrees: The Science of a Connected Age" by Duncan Watts, I couldn't stop thinking about the Swine Flu epidemic. Watts discusses networks, how they are organized, how to use them, and how they effect our lives. One of the many ways in which networks effect us is by spreading things: trends, ideas, information, and even diseases. The more connected a person is, the more access/ influence they have to/on the world.  But being highly connected also has its drawbacks.

This has been made very apparent with the Swine Flu outbreak. The group that has been effected by the outbreak the most is people in schools, whether they work at or go to them, this group seems to be the most likely to get the disease. Not just because children are susceptible to disease, (As it turns out, everyone is likely to get it, but interestingly people over 65 are less at risk, possibly since they survived a previous outbreak.), but because they are in contact with a large number of people (who may not have the best hygiene) every day. As you may have noticed, the epidemic went mostly into remission over the summer, while school was not in session, but as soon as classes started again, here came Swine Flu all over again. 

But not just school people have gotten the flu. Some people who have not seen the inside of a school building in years still manage to get it. This is where networks come into play. For example, little boy gets Swine Flu from someone in his class, then comes home and infects his dad, who goes to work and infects someone there, who goes to worship and infects someone there, etc. Pretty soon the disease has spread to people who have never even heard of the original little boy, but they are connected to him, though the chain of disease. Not a pretty story for sure, but it does illustrate the chain of connections through network. 

By now almost all of us at least know someone who has had swine flu, if we haven't had it ourselves (knock on wood). A year ago, we have never even heard of it, 
and feared the "looming" Bird Flu pandemic. The high level of contagiousness of this disease made the "slow growth phase" pretty much non-existent, and pretty much just skipped straight to the "explosive phase (p.172)." Luckily, unlike his example of *shudder* the Ebola virus, the Swine Flu does not guarantee death, but because of this, it does not reach the "burn out" phase quite as fast.  If God forbid, something like the Ebola virus did break out in the United States, or any highly populated area, it could be devastating, like the plague, but faster. According to Watts, the only people who are "safe" from an outbreak are those who have been "removed", either by recovery, inoculation, or death (p. 168). 

So what do you do to control the disease? UT Dallas has this advise on the Student Health Center website:

Take these everyday steps to protect your health:

  • Cover your nose and mouth with a tissue when you cough or sneeze. Throw the tissue in the trash after you use it.
  • Wash your hands often with soap and water, especially after you cough or sneeze. Alcohol-based hand cleaners are also effective.
  • Avoid touching your eyes, nose or mouth. Germs spread this way.
  • Try to avoid close contact with sick people.
  • CDC recommends that people with influenza-like illness remain at home until at least 24 hours after they are free of fever (100° F [37.8°C]), or signs of a fever without the use of fever-reducing medication

Once you have contracted a virus best way to protect yourself and others is to cut yourself off from your network.  This is also true for computer viruses. Once a computer is infected with a virus, it should be cut off from the network until the virus has been eliminated. 

But what about the massive power outages or factory breakdowns Watts discusses? In the situation of the power outages, cutting off "infected" areas by the automatic breaker system, which was supposed to protect the system actually ended up making the situation worse, by rerouting power to other branches of the system and overwhelming them to the point of overload and meltdown. Sometimes cutting off a problem area in a network is like cutting off your nose to spite your face...it does more harm than good. 

The networks in our lives are very powerful, but also very fragile tools. The same chain or group of people that can help you get a new job or introduce you to your future spouse can also spread hurtful gossip or expose you to the swine flu. So wash your hands and be careful who you defriend, you never know how it can affect you down the line.