Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Technology

A Cheap, Distributed Zero-Day Defense? 116

coondoggie writes "Shutting down zero-day computer attacks could be carried out inexpensively by peer-to-peer software that shares information about anomalous behavior, say researchers at the University of California at Davis.The software would interact with existing personal firewalls and intrusion detection systems to gather data about anomalous behavior, says Senthil Cheetancheri, the lead researcher on the project he undertook as a grad student at UC Davis from 2004 to 2007. He now works for SonicWall."
This discussion has been archived. No new comments can be posted.

A Cheap, Distributed Zero-Day Defense?

Comments Filter:
  • Wow... (Score:5, Insightful)

    by roc97007 ( 608802 ) on Wednesday January 14, 2009 @02:16PM (#26452441) Journal

    If you could break into that process, you could rule the world.

  • Cheap Defense? (Score:5, Insightful)

    by drewzhrodague ( 606182 ) <drew@nOsPaM.zhrodague.net> on Wednesday January 14, 2009 @02:16PM (#26452449) Homepage Journal
    Six Inches of Air?
  • Not so fast... (Score:5, Insightful)

    by Jah-Wren Ryel ( 80510 ) on Wednesday January 14, 2009 @02:19PM (#26452495)

    On the face of it, it sounds like he's proposing a "trusted" infection vector. A way to distributed code intended to patch holes to systems that want it. The obvious problem with such a system is the consequences of it being compromised. Then it becomes a way to distribute malicious code much more effectively than the way bot-nets infect new hosts now.

  • Sooo... (Score:5, Insightful)

    by gblackwo ( 1087063 ) on Wednesday January 14, 2009 @02:19PM (#26452497) Homepage
    What is the zero-day defense protocol for the zero-day defense software?
  • by gblackwo ( 1087063 ) on Wednesday January 14, 2009 @02:25PM (#26452599) Homepage
    I have to giggle whenever someone thinks they need some sort of Verizon High Speed Internet CD to use the internet.

    It's almost as funny as the people who use AOL because it is the "internet" even though they are just hooked into a router and cable modem like everyone else. - this used to be acceptable when people used AOL's dialup service (or shudder- continue to use it)
  • Flimsy (Score:3, Insightful)

    by sean_nestor ( 781844 ) on Wednesday January 14, 2009 @02:31PM (#26452717) Homepage
    I can't think of any way this could fail gracefully. If this system was compromised, it'd be a powerful way to disrupt network traffic and take down important systems that happen to run it.

    "It depends on the number of events and the number of computers polled, but if there is a sufficient number of such samples, you can say with some degree of certainty that it is a worm,â Cheetancheri says. For that decision, the software uses a well-established statistical technique called sequential hypothesis testing, he says"

    I'm also skeptical that you could rely on a vast network of machines that have presumably fallen prey to an attack to share information between each other fast enough to correctly diagnose an attack with the kind of results the researcher seems hopeful of.

    Given that no method for correctly identifying "malicious" code 100% of the time currently exists, I don't think it's wise to allow a software program to run with the decision of shutting a machine down on notice of a perceived threat.

    The concept seems like an interesting idea, but I doubt It could be terribly effective in practice.

  • Re:Not so fast... (Score:5, Insightful)

    by girlintraining ( 1395911 ) on Wednesday January 14, 2009 @02:36PM (#26452801)

    On the face of it, it sounds like he's proposing a "trusted" infection vector. A way to distributed code intended to patch holes to systems that want it. The obvious problem with such a system is the consequences of it being compromised. Then it becomes a way to distribute malicious code much more effectively than the way bot-nets infect new hosts now.

    You forget that the system is also leaking information about the traffic it is sending/receiving at the same time, and possibly internal state information (such as what applications are loaded, plugins, etc). That data in and of itself is valuable to an attacker, nevermind whether the vector can be protected or not... It opens up the possibility of discovering new vectors in ways maybe not possible remotely.

  • by pipboy9999 ( 1088005 ) on Wednesday January 14, 2009 @02:48PM (#26452997)
    while I don't agree with the way this was put, I do agree that if this lady wasn't smart enough to due to research and double check her order before pushing "check out" then its not really Ubuntu's fault she bought some thing that does not meet her requirements.
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Wednesday January 14, 2009 @02:50PM (#26453037)
    Comment removed based on user account deletion
  • by Thaelon ( 250687 ) on Wednesday January 14, 2009 @03:05PM (#26453333)

    A Cheap, Distributed Zero-Day Defense?

    User education.

  • by A nonymous Coward ( 7548 ) on Wednesday January 14, 2009 @03:24PM (#26453643)

    Who watches the watchers?

    Any system like this would be a premium cracker target. All it would take is one false positive or false negative before no one would trust it again.

    Six months later, some other researcher would make a new proposal for a p2p system to guard the broken p2p system.

  • by whiteworm ( 1452871 ) on Wednesday January 14, 2009 @04:53PM (#26455163) Homepage
    Yes, I'll agree the article isn't revealing. The difference between our work and "Autograph" type approaches that WormShield builds on is that we are doing traffic anomaly detection and these more involved approaches attempt to automatically build a signature. The paper is available (only, sigh) from Springer, in "Recent Advances in Intrusion Detection 11th International Symposium", RAID 2008, Cambridge, MA, USA. -JMA

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...