Tweet





Share

New system recovery restores computers infected by the virus, could be used by organizations - Nextgov

Researchers at the Massachusetts Institute of Technology, backed by funding from the Government contractor Northrop Grumman Corp. have developed a tool that serves as a Cancel button to restore the computers after that they are infected by the virus, said a computer scientist leading the effort.


The so-called intrusion recovery system is on a dozen research projects underway at universities MIT, Purdue, and Carnegie Mellon, sponsored by the Research Consortium of Northrop Grumman cybersecurity for possible deployment to government agencies. The industry-academia partnership, which was established in late 2009, share some of its progress with journalists Wednesday.


For its part, Northrop Grumman has contributed to the database giant composed of tens of thousands of viruses and other malicious software that researchers use to test their work. A conclusion: the malware "stuxnet", which apparently began the Iranian nuclear program by sabotaging the system operational reactors "was obviously written by a team of experts as opposed to a single person", said Robert Brammer, officer head of information systems technology company.


The worm - a million and a half lines of code - is much larger and more sophisticated than the majority of viruses and reflects considerable expertise, in industrial control systems, he said.


Computers by viruses much less brutal Stuxnet - or perhaps even more so in the future - can take days of wasted energy to fix. Often, employees inadvertently install malicious software simply by downloading the corrupt screen savers or broadband Internet greeting cards.


"Many machines is compromised on a daily basis with the gates stolen for attackers to connect to remote machines," said Professor of computer science MIT Ronald Rivest l., adding that an another big pest are networks of botnets that hijack computers to distribute spam or flood websites with useless traffic to stop the service.


The purpose of the project team MIT undo is to automate the task of restoring systems after a violation.


"When an intrusion is detected, our system cancels all files affected by the attack... and reruns all legitimate calculations - of course skip the attack itself,", he said. "It restores the attack and preserves changes made by legitimate users in the meantime."


The work of the device by, first of all, a history of all calculations performed by a user and then tracing actions to determine when and where a botnet or entered registration backdoor system, said.


Northrop Grumman officials said some of the initiatives of the consortium would be ready for the Federal Government to use over the next two years, but the timeline for the acquisitions of the Agency is out of control of the consortium.


A concern that researchers are faced with is the unintended consequences of their safety innovations - such as the filters that modify oppressive regimes to cut access to the Internet or to follow dissidents online.


This is not a new factor of stress for academics. Alfred Nobel, who invented dynamite, suffered the same cognitive dissonance and founded the Nobel Prize for peace, said Eugene h. Spafford, Executive Director of Purdue's Center for Education and Research in Information Assurance and security. "He is horrified by some of the uses in the war", Spafford said.


Purdue solves the problem of the infamous research applications requiring students to take courses in ethics. "We have deep discussions on privacy and the appropriate use of technology and we try to ensure that as we look at how technology is developed, y wide debate where technology can be used and how people develop should ensure that it is some attention" for public freedoms, he said.


On Monday, a separate group of researchers compiled by reflection of Washington Center for new American security group issued cybersecurity recommendations - has a commission on the White House on the future of Internet security.


The task force, composed of Government, industry and academic experts, grapple with how to change the foundations of the Internet to secure architecture. Robert Kahn, who invented the infrastructure of the Internet today, devoted a chapter of the report about 300 pages to the idea of defending systems by assigning and inserting codes of the identity of confidence for each user and the device.









Adobe Photoshop
Adobe Photoshop Lightroom 3 Student & Teacher Edition
by Adobe
Ranking has gone up in the past 24 hours 336 days in the top 100
Platform:   Windows XP / Vista / 7, Mac OS X Intel
4.1 out of 5 stars(54)

Buy new: $299.00 $79.99

 










Norton Internet
Norton Internet Security 2011 - 1 User/3 PC
by Symantec
261 days in the top 100
Platform:   Windows Vista / 7 / XP
4.2 out of 5 stars(370)

Buy new: $69.99 $32.24
80 used & new from $23.75

Get New Article Alerts In Your Inbox

Subscribe to Computers Knowledge Article Alerts to get daily notifications of our newest articles in your email for free. You can unsubscribe at any time. share your opinion about New system recovery restores computers infected by the virus, could be used by organizations - Nextgov by comment on below post.

 

Thank you in advance.

Yours sincerely,

suyanto-signature


Bookmark to: Technorati   Bookmark to: Del.icio.us   Bookmark to: Google   Bookmark to: Yahoo   Bookmark to: Blinklist   Bookmark to: Digg   Bookmark to: Reddit

Related Posts :



0 komentar:

Posting Komentar

Categories

10100Mbps 156Inch 240GB 256MB 28GHz 2x120GB 384019003 412786001 418872001 419107001 463552003 519329002 5Port 608425002 608425003 609939001 7270FW 7Inch 80211g 920002555 about Access Accreditation Accreditations Accurate accused Acquires Adapter AdapterPower Advantage Advisor adware against Agency Alien Allows Altering Amazon AmericanStatesman AMZAZING Android Announce Announces Anyone appealDemocrat Apple arrested article Assessments Atlantic Atrix Attain Audio Austin Automation AutoMDIX Backlinks Bagleheads Barranco Based basics batteries Because Being Believe Benefits Better Black BlackBerry Bloomberg Bookmarking Books Boost Bottom Braces Bradleyaposs break bride Briefcase Brilliant bring browsing Budget Business businesses Busters Cable calculate Calculators Career Carrier CCCHSA0DSU01 CDROM CDRWDVD Certification Certifications change Changed charge Chatting cheap chest chips Choices Christian Clarksville Class Cleaner Clear Clearly clinical close cloud Combo coming commerants Common Commtouch companies Company Completely Computer ComputerActivecouk computers Computerworld computing ConceivablyTech Concept Connection Consumerization consumers Contemporary control Converter Cosmetic Costs could Courses CrossPlatform Cyber Cyberwar Dalvik daughter decision defpro Demystifying Dentistry dependency Depth design Desktop desktops destroy device devices Dewalt Diamond different digital Disable Dispatch disrupted documents domainB download Downs Droid DVDROM DWave Dwelling early Edgar Edition Education effective efficient Electronic Electronics Eliminate Elimination Elysium Embrace Enables engine engineer Ensure enyoy Eradicate escape Ethernet every exactly Examinations Excel expands Experts exploring extends Extension F7553D350 Facebook Factor faire Features Feeder Files Finest Finish Firefox Firewall first Flash Flyer Forbes Framework Freeze Freezes Friday function Fundamentals funding Fusion Gamers Games Gaming GDDR2 Geekzone Gerrit Getting GigaOm Globes Goodbye Google Googleaposs Government Gradual grande Greatest Guide hampel Hannspad Hannspree Harry hazard Heights hello Helps Herald Heres Hershey HewlettPackard Hints Homage homes hosting Huawei Huffington iCloud Immersion Imperio Importance Imports incarnate Increase India Industry infected infringement Inquirer Insider Inspire Instant Intel Intellectual intelligent InterinetSkim International Internet introducing Invest investigative iPhone Isnapost jargon joins Journal journalism Keyboard Kindle Kingston laptop laptops Laser Latest launches Leader leaks Learned Leelee Lessons Level Leveling Levels Lexington Lexmark Liliputing Limited Lindhurst Linksys LockheedMartin Logitech LogMeIn Lunch Magazine maintenant majorit majority Making malware management Managers Managing Manner Market Marketing MarketWatch Marketwire MctiviaFrom MD1024SD1333 Meadows media memory Menus Micro microSD Microsoft Midnight Might Million Minneapolis Mk550 Mobile Modern Module Monday Money Monitor Mortgage Mostly Mouse moving Mozilla MrExcelLiveLessons msnbccom MSPmentor mtiers Mueller Myths Needed Network networks newly NewsChannel Nextgov Nokia NoniPadTablet notebook Novel observer Office online Operating Optical OPTIMA optimization Oracle Ordinateurs Organization organizations ORourke outsource overtake Pages PanDigital Paperback Parents Particulars patents Payday Paying PC2700 people People percent perform Performance Permanently Personal Pfizer Philadelphia philippines Phillip phone PHOTOS Pinball Planning plans PocketCloud Pogoplug Points Polkast Popular Popularity Ports Potter Power PowerPoint Precaffeine press prices printing prints Produkt Professional Professionals Profitable Program promise promised Promote Property Prospects Protect prototype proven Provider public publishing punching purchasing purported Qosmio Qualification Qualifications quality Quarter quick Quickly Radeon rapidrelease Razer ready Reasons recall recovery Reflecting regarding register Registry relation release releases Relevance reliable Remote remotely Remove Reorganizes Replica Replication Reports Residence Restore restores Results Retail revealed Reviewed revolution right Ripping Rocket roots Router Running Samsung SanDisk Sapphires School schools Science Score Screen SDC2GB SDSDB8192A11 seamless search Seattle Second security Seeks Selling Sensation Sense Service services Setting Seven Short Shouldnt signs Sites sketches SlashGear Small smart Smartphone smartphones Smiles Smooth SN10T1 Sobieski Social Software solution Someones something Sorts Sound Spanish SPDIF special Specialists specs Spectacular Speed Sphere Spiralbound Spyware square StarTechcom Starting state Stealth SteelSeries Steve Stock Stocks Story Streaming Street student students Studies Superior supplier SupplyCord support surfing Switch Switcher system systems Table tablet tablets tagged Taiwan Tamas TE100S5 TechCrunch Techniques technology Tests Texts thefts Their Thinking THINTOS10 Threats Through Times TimesLeader timing Today Toshiba Toslink Total touch Toward transform Trend TRENDnet Trends trial Tribune Trust Turbine turbo Turning Tutorial Twitter Typical Ultimate Ultra understand Undertake Unique university Unveils Unwired Upgrade Upload Users Using Utica Value Vampire version Video Videonow Videos virus voice Warcraft Warrior Washington Watches Webcam WebOS Website websites wedding Weddings welcomes which White Wholesale Wilkes Window Windows Windowscompatible Wireless Wisdom Wizard Working World Worth Wrong X8300455NBK Xigmatek Yearold young yourself YouTube

 
Your Ad Here