Researchers at the Massachusetts Institute of Technology, backed by funding from the Government contractor Northrop Grumman Corp. have developed a tool that serves as a Cancel button to restore the computers after that they are infected by the virus, said a computer scientist leading the effort.
The so-called intrusion recovery system is on a dozen research projects underway at universities MIT, Purdue, and Carnegie Mellon, sponsored by the Research Consortium of Northrop Grumman cybersecurity for possible deployment to government agencies. The industry-academia partnership, which was established in late 2009, share some of its progress with journalists Wednesday.
For its part, Northrop Grumman has contributed to the database giant composed of tens of thousands of viruses and other malicious software that researchers use to test their work. A conclusion: the malware "stuxnet", which apparently began the Iranian nuclear program by sabotaging the system operational reactors "was obviously written by a team of experts as opposed to a single person", said Robert Brammer, officer head of information systems technology company.
The worm - a million and a half lines of code - is much larger and more sophisticated than the majority of viruses and reflects considerable expertise, in industrial control systems, he said.
Computers by viruses much less brutal Stuxnet - or perhaps even more so in the future - can take days of wasted energy to fix. Often, employees inadvertently install malicious software simply by downloading the corrupt screen savers or broadband Internet greeting cards.
"Many machines is compromised on a daily basis with the gates stolen for attackers to connect to remote machines," said Professor of computer science MIT Ronald Rivest l., adding that an another big pest are networks of botnets that hijack computers to distribute spam or flood websites with useless traffic to stop the service.
The purpose of the project team MIT undo is to automate the task of restoring systems after a violation.
"When an intrusion is detected, our system cancels all files affected by the attack... and reruns all legitimate calculations - of course skip the attack itself,", he said. "It restores the attack and preserves changes made by legitimate users in the meantime."
The work of the device by, first of all, a history of all calculations performed by a user and then tracing actions to determine when and where a botnet or entered registration backdoor system, said.
Northrop Grumman officials said some of the initiatives of the consortium would be ready for the Federal Government to use over the next two years, but the timeline for the acquisitions of the Agency is out of control of the consortium.
A concern that researchers are faced with is the unintended consequences of their safety innovations - such as the filters that modify oppressive regimes to cut access to the Internet or to follow dissidents online.
This is not a new factor of stress for academics. Alfred Nobel, who invented dynamite, suffered the same cognitive dissonance and founded the Nobel Prize for peace, said Eugene h. Spafford, Executive Director of Purdue's Center for Education and Research in Information Assurance and security. "He is horrified by some of the uses in the war", Spafford said.
Purdue solves the problem of the infamous research applications requiring students to take courses in ethics. "We have deep discussions on privacy and the appropriate use of technology and we try to ensure that as we look at how technology is developed, y wide debate where technology can be used and how people develop should ensure that it is some attention" for public freedoms, he said.
On Monday, a separate group of researchers compiled by reflection of Washington Center for new American security group issued cybersecurity recommendations - has a commission on the White House on the future of Internet security.
The task force, composed of Government, industry and academic experts, grapple with how to change the foundations of the Internet to secure architecture. Robert Kahn, who invented the infrastructure of the Internet today, devoted a chapter of the report about 300 pages to the idea of defending systems by assigning and inserting codes of the identity of confidence for each user and the device.
Adobe Photoshop Lightroom 3 Student & Teacher Edition
by Adobe

Platform:


Buy new:
Norton Internet Security 2011 - 1 User/3 PC
by Symantec
261 days in the top 100
Platform:


Buy new:
80 used & new from $23.75
Get New Article Alerts In Your Inbox
Subscribe to Computers Knowledge Article Alerts to get daily notifications of our newest articles in your email for free. You can unsubscribe at any time. share your opinion about New system recovery restores computers infected by the virus, could be used by organizations - Nextgov by comment on below post.
Thank you in advance.
Yours sincerely,







0 komentar:
Posting Komentar