The Independent Voice of Southern Methodist University Since 1915

The Daily Campus

The Daily Campus

The Independent Voice of Southern Methodist University Since 1915

The Daily Campus

The Independent Voice of Southern Methodist University Since 1915

The Daily Campus

The crew of Egg Drop Soup poses with director Yang (bottom, center).
SMU student film highlights the Chinese-American experience
Lexi Hodson, Contributor • May 16, 2024
Instagram

Hackers wreak havoc on university campuses

You get online. No one is in the room with you, or so you think. You check your e-mail, surf the net for a couple of minutes and sign off.

In those few minutes, a hacker may have randomly targeted your Internet protocol address – your individual number for connecting to the Internet – according to Jim Dunham, associate professor of electrical engineering at SMU.

The hacking problem is growing at SMU and at college campuses nationwide, experts say. Hackers can attack by altering Web sites or even scanning computers for specific files.

Merlin Wilkerson, director of network and systems at SMU’s School of Engineering, said there has been a steady increase in hacking for the past two or three years at SMU.

Hackers have gained a lot of publicity lately, David Sossaman, a sophomore computer science major said. He believes that the publicity is leading to an increase in hacking because it allows hackers to become more sophisticated.

Some examples of recent hacking incidents at universities across the country:

  • The Dallas Morning News reported that in late February or early March, someone hacked into the University of Texas computer network and obtained 55,000 social security numbers of students, faculty and alumni.
  • The Columbia Daily Spectator reported in February that a hacker had attacked the university network two times in an eight-day span. Columbia University’s home page was also replaced by a pornographic Web site. Officials believe that the same hacker was responsible for both incidents.
  • In August of 2001, The Chronicle of Higher Education reported an incident at the University of Indianapolis campus in Athens, Greece. A hacker, or hackers, sent spam pornographic advertisements from an account within the system. Officials were surprised because normally spam mail is sent from outside e-mail services.
  • The Chronicle also reported in July about a hacker striking two Internet servers at Indiana University at Bloomington. While in the system, the hacker set up a chat program to communicate with other hackers, officials said. Students’ social security numbers were stolen.

    At SMU, the engineering network has not directly been attacked, but it has taken on extra traffic, Wilkerson said. This traffic, or hits, are requests for specific files and URL addresses.

    For one Microsoft file, the engineering network got thousands of hits, Wilkerson said. Such high traffic could cause the system to shutdown.

    While Wilkerson and the engineering department receive numerous hits for files, that is nothing compared to what major university networks face.

    “[The] engineering department receives 20 or 30 percent less [hits] than a major university network, and we see a lot,” Wilkerson said.

    The engineering department protects its network with a homegrown firewall, a screening device that protects the network, and all the personal computers on the network have the latest software protection, Wilkerson said.

    Sossaman said there are two groups of people who hack into Web sites: hackers and crackers.

    Hackers are generally good people who hack into a site to let the owners know about loopholes in their security, Sossaman said. The hackers report their results to site owners immediately.

    “The public never sees true hacking, generally,” he said.

    Crackers are the ones who go into systems and networks with the intent to do harm, Sossaman said. They go into credit card databases to get personal information and perform denial of service attacks on Web sites.

    A denial of service attack is spamming a Web site server with so many requests that the server shuts down. This can stop people from connecting to a server, and, in some cases from going online.

    Hackers will steal from anyone, Dunham said. While they tend to hit registered IP addresses such as the SMU network, unregistered users, like Dunham himself, are also attacked. At home, Dunham uses an unregistered IP address.

    Hackers will randomly type IP addresses in an effort to match an unsuspecting user. As a result, Dunham frequently checks his computer for hits.

    On average, six hackers try to attack Dunham’s home computer each week. So far, none have been successful, he said.

    “Fortunately, no one got into my computer,” Dunham said.

  • More to Discover