Security boffins dissect iCode's future

Powered by SC Magazine
 

Metrics and malware on the agenda for Sydney review.

How would the iCode target malware that activates only over public wifi? Can accurate figures be obtained on customer infections?

These are some of the questions that will be asked when telco and government security boffins meet to discuss the anti-botnet iCode tomorrow in Sydney.

Telcos that subscribe to the iCode monitor their networks for signs of malware activity on subscriber machines and then contact victims to help remove any infections.

The standing-room only event coincides with an 18 month review of the iCode by the Department of Broadband, Communications and the Digital Economy (DBCDE) and the Internet Industry Association (IIA).

The review would attempt to gauge the success of the scheme and whether changes were needed including the slim possibility of mandating that telcos adopt specific technologies and processes to comply with the otherwise relaxed and voluntary scheme.

Telcos and the Internet Industry Association which oversaw the iCode disliked the prospect of having prescribed technologies.

“We’re all different organisations,” Internode security manager Derek Groke said. “We’ve got different processes, people, infrastructure, some are publicly-listed and others not. All this makes a big difference.”

Yet statistics that show success or failure of the iCode do not exist because of the differences in the way telcos handled customer malware infections.  

Instead, the iCode was considered a success because it was essentially an extension to small ISPs of long-established practises within large telcos to help keep machines clean – and customers happy.

Groke and his counterparts at Telstra, Optus and iiNet kept watch of infections like Flashback and DNSChanger that spiked across their subscribers and would issue removal instructions to frontline customer service staff.

“We have all been doing this for a long time,” Groke said. “It’s about good business practice and competitiveness, and about freeing up customer service staff.”

“At the end of the day, you do as much as you can, as often as you can.”

Discussions would also examine how the iCode would tackle emerging sophisticated malware and operate in an IPV6 environment.

Rob Forsyth, former IIA board member and local managing director of security firm Sophos had discussed ways malware writers could complicate customer disinfection efforts.

“Imagine malware that would only spew out spam when an infected device connects to a public hotspot at say Starbucks or the Qantas lounge - how would you help clean the device?” Forsyth said.

He had also discussed with fellow iCode members about how botnets may be tracked over large IPV6 address spaces, which he described as “different, but not more difficult”.

The discussions were the most advanced of the anti-botnet iCode deployments. In May, South Africa announced it would deploy the iCode while the US adopted the scheme in all but name.

Senior Indian Government officials had also flagged keen interest in the code while former iCode creator and IIA Peter Coroneos had pitched the scheme to European governments and telcos at the Messaging Anti-Abuse Working Group conference in Berlin last week.

Copyright © SC Magazine, Australia


Security boffins dissect iCode's future
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 342

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote