Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

New system controls computer worms
UPI ^ | 02/12/07

Posted on 02/12/2007 7:00:35 AM PST by nypokerface

STATE COLLEGE, Pa., Feb. 12 (UPI) -- U.S. scientists have created anti-worm computer technology that can identify and contain "worms" milliseconds after a cyberattack begins.

A worm is a type of computer virus that doesn't alter files but resides in active memory and can duplicate itself. Worms are not usually noticed until their uncontrolled replication begins to interfere with a computer's operation.

Penn State University scientists said current technologies focus mostly on signature or pattern identification. And that means they cannot respond to attacks fast enough, allowing worms to exploit network vulnerabilities.

The new technology instead targets a packet's rate or frequency of connections and the diversity of connections to other networks, allowing it to react far more quickly than other technologies.

"A lot of worms need to spread quickly in order to do the most damage, so our software looks for anomalies in the rate and diversity of connection requests going out of hosts," said Peng Liu, associate professor of information sciences and technology at Penn State and lead researcher on the PWC system.

Penn State has filed for a patent for the system invented by Liu and doctoral students Yoon-Chan Jhi and Lunquan Li.


TOPICS: News/Current Events
KEYWORDS:

1 posted on 02/12/2007 7:00:36 AM PST by nypokerface
[ Post Reply | Private Reply | View Replies]

To: nypokerface

bump for later


2 posted on 02/12/2007 7:03:10 AM PST by ghostrider
[ Post Reply | Private Reply | To 1 | View Replies]

To: nypokerface
Rate limiting filtering applied to the host... been done in the network before with ACLs and firewalls. Not sure this rises to the level of a patent as moving the rules from the network to the host is obvious and it is very close to prior art.

But I like the idea anyway.
3 posted on 02/12/2007 7:07:25 AM PST by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: taxcontrol

The arms race continues.


4 posted on 02/12/2007 7:13:18 AM PST by Perdogg (Happy 2007.11)
[ Post Reply | Private Reply | To 3 | View Replies]

To: nypokerface
Penn State has filed for a patent for the system invented by Liu and doctoral students Yoon-Chan Jhi and Lunquan Li.

The de-Americanization of scientific academia is growing apace. Tough research, modest salaries and uncertain returns and future are turning US science into an increasingly Oriental-dominated field. I work amongst them.

This is not a criticism of the Chinese. They're simply filling a vacuum created by the American abandonment of science.

5 posted on 02/12/2007 7:23:37 AM PST by marshmallow
[ Post Reply | Private Reply | To 1 | View Replies]

To: nypokerface

Sheesh. I wrote my own <1000 line program to do exactly this with Perl and libpcap years ago when Blaster, etc. hit. Amazing what can be patented -- and sadly they'll probably get it awarded.


6 posted on 02/12/2007 7:31:08 AM PST by sigSEGV
[ Post Reply | Private Reply | To 1 | View Replies]

To: Perdogg
The arms race continues.

When someone comes up with a new defense (in any field: sports, computers, law enforcement, military), WHY do they feel compelled to tell the enemy how it works? Sure, they might eventually figure it out on their own, but why help them? My advice would be STFU.

It's like a stupid baseball manager who says they always hit a certain pitcher because he holds his glove differently when he is going to throw a curve. So the pitcher says, "Hey, thanks!"

7 posted on 02/12/2007 7:45:38 AM PST by Right Wing Assault ("..this administration is planning a 'Right Wing Assault' on values and ideals.." - John Kerry)
[ Post Reply | Private Reply | To 4 | View Replies]

To: sigSEGV
Sheesh. I wrote my own <1000 line program to do exactly this with Perl and libpcap years ago when Blaster, etc. hit. Amazing what can be patented -- and sadly they'll probably get it awarded.

No doubt. The behavior of worms can be easily distinguished on networks, as can much other malicious behaviors. Whenever our internal security folks scan our subnets, I get an email from a process that runs on my computer(s) and watches for such things. I then send an email to NetSec, and verify that they were behind the scan. (Just in case baddies were at work.) That freaked out one of the NetSec guys the first time, but he was grateful that I was being vigalent.

8 posted on 02/12/2007 11:18:27 AM PST by zeugma (MS Vista has detected your mouse has moved, Cancel or Allow?)
[ Post Reply | Private Reply | To 6 | View Replies]

To: nypokerface

Sounds like, as an added bonus, this technique would work equally well with spam!


9 posted on 02/12/2007 2:12:56 PM PST by Publius6961 (MSM: Israelis are killed by rockets; Lebanese are killed by Israelis.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nypokerface
Cool.


10 posted on 02/12/2007 2:14:45 PM PST by BibChr ("...behold, they have rejected the word of the LORD, so what wisdom is in them?" [Jer. 8:9])
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson