Transcript Slide 1
John Gastreich Background Botnets Distributed denial of service attacks (DDoS) Spam, adware, spyware, click fraud, credit card fraud, … Background (cont.) It is becoming more common for researchers to take over control of a malicious botnet April 2007: University of Mannheim infiltrated the Storm botnet Discovered other researchers UCSD and Georgia Tech observing The Problem Is it ethical for academic institutions to withhold valuable botnet information from authorities? Role of academics: Derive knowledge that can then be disseminated to: ○ Corporations ○ Service providers ○ Law enforcement ○ General public They have an obligation to act responsibly Literature Review A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets The Ethics of Cyberweapons in Warfare Research Question H1: When a user’s computers is being used in research experiments which knowingly have information to deter the spread of a botnet, users will choose to allow the experiment to continue. Importance Cybercrime Ethics Lawmakers Cyberweapons Methodology and Research Approach Continue research on cybercrime research related ethics Laboratory experiments Expected Results Users will choose to allow the progress of science Users will not terminate the research Implications: Users will allow researchers to investigate and possibly change a crime scene Extending the Body of Knowledge Show current ethical stance of computer users Create groundwork for future ethical / cybercrime issues