Exploring the Connection: Analyzing the Relationship Between Duqu and Stuxnet

Year : 2024 | Volume : 11 | Issue : 03 | Page : 11 17
    By

    Rushikesh Ravindra Adsule,

  • Asra Sadaf,

  1. Student, Department of Computer Science Engineering (IOT and Cybersecurity including Blockchain), Jawahar Education Society A.C. Patil College of Engineering, University of Mumbai, Kharghar, Maharashtra, India
  2. Professor, Department of Computer Science Engineering (IOT and Cybersecurity including Blockchain), Jawahar Education Society A.C. Patil College of Engineering, University of Mumbai, Kharghar, Maharashtra, India

Abstract

Malware computer worms like Stuxnet and Duqu have the ability to take down any computer system in the globe. Although they are extremely similar to one another, Duqu is superior to Stuxnet. Because it comes in two versions, Duqu 1.0 and 2.0, it is also more harmful and dangerous than Stuxnet. The first malware attack to garner international attention was Stuxnet, which was designed to physically harm industrial infrastructure that seemed to be cut off from the internet. The malware known as Stuxnet was discovered in 2010 by the Belarusian antivirus company VirusBlokAda. This discovery marked the first time that a cyber weapon had ever been reported globally. Duqu and Stuxnet are two of the most sophisticated and notorious pieces of malware to have emerged in recent years. Both are believed to be state-sponsored cyber weapons made for some specific purposes, with Stuxnet designed mainly to target Iran’s nuclear program and Duqu being associated with espionage activities in different countries. This paper is used to provide a comparative analysis of Stuxnet and Duqu and examining their origins, functionalities, propagation method, and impacts on cybersecurity. These two malwares not only impacted some computer network but also caused huge losses to many industries in different countries. This paper examines the lessons learned from analyzing these sophisticated threats and the measures taken by organizations and governments to defend against similar cyber weapons in the future.

Keywords: Duqu, Stuxnet, espionage, zero-day vulnerabilities, cybersecurity

[This article belongs to Journal of Telecommunication, Switching Systems and Networks ]

How to cite this article:
Rushikesh Ravindra Adsule, Asra Sadaf. Exploring the Connection: Analyzing the Relationship Between Duqu and Stuxnet. Journal of Telecommunication, Switching Systems and Networks. 2024; 11(03):11-17.
How to cite this URL:
Rushikesh Ravindra Adsule, Asra Sadaf. Exploring the Connection: Analyzing the Relationship Between Duqu and Stuxnet. Journal of Telecommunication, Switching Systems and Networks. 2024; 11(03):11-17. Available from: https://journals.stmjournals.com/jotssn/article=2024/view=191945


References

  1. Denning DE. Stuxnet: what has changed? Future Internet. 2012; 4 (3): 672–687.
  2. Maynard P, McLaughlin K, Sezer S. Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems. J 2020; 6 (1): tyaa020.
  3. Bencsáth B, Pék G, Buttyán L, Félegyházi M. The cousins of Stuxnet: Duqu, Flame, and Gauss. Future Internet. 2012; 4 (4): 971–1003.
  4. Langner R. To Kill a Centrifuge: A Technical Analysis of What Stuxnet’s Creators Tried to Achieve. 1st Edition. Arlington, VA, USA: Langner Communications; 2013.
  5. Zetter K. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. 1st Edition. New York, NY, USA: Crown Publishers; 2014.
  6. Kushner D. The Real Story of Stuxnet: The Cyberweapons Program That Took Down Iran’s Nuclear Program. 1st Edition. San Francisco, CA, USA: New Press; 2013.
  7. Bencsáth B, Pék G, Buttyán L, Félegyházi Duqu: analysis, detection, and lessons learned. In: Sadeghi A-R, editor. Proceedings of the ACM Conference on Computer and Communications Security (CCS 2012). October 16–18, 2012. Raleigh, NC, USA. ACM Press; 2012. pp. 749–762.
  8. Karnouskos Stuxnet worm impact on industrial cyber-physical system security. Plasil F, Stal M, editors. In: Proceedings of the 37th International Conference on Software Engineering (ICSE 2011), May 21–28, 2011, Honolulu, HI, USA. Berlin, Germany: Springer; 2011. pp. 149–152.
  9. Falliere N, Murchu LO, Chien W32. Stuxnet dossier. In: Proceedings of the Virus Bulletin Conference. September 29–October 1, 2010. Vancouver, BC, Canada. Oxford, UK: Virus Bulletin Ltd.; 2010. pp. 7-22.
  10. Lindsay JR. Stuxnet and the limits of cyber warfare. Security Stud. 2013; 22 (3): 365–
  11. Sari A, Atasoy UC. Taxonomy of cyber attack weapons, defense strategies, and cyber war incidents. In: Sari A, editor. Applying Methods of Scientific Inquiry into Intelligence, Security, and Counterterrorism. Hershey, PA, USA: IGI Global; 2019.pp. 1–45.

Regular Issue Subscription Review Article
Volume 11
Issue 03
Received 05/08/2024
Accepted 12/08/2024
Published 05/09/2024


Login


My IP

PlumX Metrics