Rootkits and What We Know: Assessing U.S. and Korean Knowledge and Perceptions

Rootkits and What We Know: Assessing U.S. and Korean Knowledge and Perceptions

Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, HJ Hwang
DOI: 10.4018/978-1-60566-210-7.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Respondents from eight Korean and United States higher education institutions were surveyed as to their knowledge and experience with various forms of computer malware. The surveys provide insight into knowledge of rootkits that have become coffee lounge discussion following the once secretive Sony rootkit news break in late 2005 and then the rash of accusations and acknowledgements of other rootkits that followed. The surveys provide an empirical assessment of perceptions between students in the two countries with regard to various forms of malware. The two groups are similar in many respects but they exhibit significant differences in self-reported perceptions of rootkit familiarity. U.S. respondents report higher levels of familiarity for all assessed malware types, including the fictional “Trilobyte” virus. A timeline-based comparison between virus and rootkit knowledge reveals that relatively little is known about rootkits today. This highlights dangers related to existing knowledge levels but presents hope for solutions and an accelerated rootkit awareness curve to improve worldwide malware protection.
Chapter Preview
Top

Introduction

Korea and the U.S., along with the rest of the Internet enabled world, continually battle a growing number of computer attacks. The source of these attacks may be domestic or foreign. The attacks may be from government or terrorist sponsored organizations for intelligence gathering or they may be from criminal groups or individuals intent on financial gains. The attacks may be against personal, business, education, or governmental computer assets. Regardless of the source or target, each country must prepare for current attacks as well as attacks that will surely occur in the future. For maximum effect, the preparation must be to protect personal, business, and governmental assets, and the preparation must span the globe.

Countries around the globe need skilled persons to battle against attacks, and these countries certainly have attackers who are on the opposite side of the battle field. Each country houses hackers who create malware and each country trains computer hackers for offensive as well as defensive cyber attacks. Despite its lack of sophisticated digital infrastructure, North Korea has attacked both South Korean and U.S. governmental computer installations. The capabilities of graduates from Kim il Sung’s North Korean hacker training academy, where students undergo five years of specialty courses for hacking careers, are said to be comparable to the best U.S. CIA trained hackers (Digital, 2005).

During this decade, U.S. Soldiers have been indicted for breaking into South Korean computer systems (Stars, 2001). We don’t know whether or not this was government sponsored, but we do know that attacks are not only one-to-many or many-to-one events. Rather, cyber attacks are characterized as events in which many sources are involved in attacking many targets. South Korea’s Ministry of National Defense said a five percent budget increase was allocated mainly for projects such as “the buildup of the core capability needed for coping with advanced scientific and information warfare.” The report also revealed that South Korea’s military has 177 computer training facilities and had trained more than 200,000 “information technicians” (Kramarento, 2003). Training efforts such as these are a necessary strategy for any country that is a part of today’s malware infested landscape.

A relatively new form of malware is a rootkit. Although well known in the Unix arena, rootkits are now rapidly expanding in Windows environments. Even the newest software developments may not be immune to rootkits as Polish security researcher Joanna Rutkowska demonstrated blue pill – a proof of concept rootkit to circumvent pre-release Microsoft Vista security. A rootkit is a piece of software that allows its user to gain top level (root) privileges where the rootkit is installed. A rootkit is not a virus or a worm but it may deliver a virus or worm. Once installed, if a backdoor mechanism is made available to the attacker, the rootkit will allow the attacker to “own” the machine. Co-author of the now famous rootkit.com website, Jamie Butler, says that it is this stealth nature of a rootkit that is the real danger as a “rootkit is software used to hide other software from the user and security tools, to evade detection” (Williamson, 2007). The result is, because they are unknown, rootkit infections may last longer and therefore do more damage for longer periods than could a single worm or virus.

Our belief is that rootkit threat levels are not understood and our purpose is to describe the findings from a cross-cultural study. The research goal is to assess the knowledge levels and perceptions of Korean and U.S. college students regarding rootkits and more traditional malware with an eye toward identifying possible problems or solutions that might surface. The organization is to first examine selected relevant literature regarding Korea and the U.S. in today’s digital world. Rootkits are then examined as to their current status and potential threat level. The study methodology is briefly described and the data comparisons are presented and discussed. Finally, the limitations that should be considered in interpreting the results are suggested and courses of action for these and other countries are recommended.

Complete Chapter List

Search this Book:
Reset