iTnews

Software developed to stop zero-day attacks

By Iain Thomson on Jan 16, 2009 11:31AM

Researchers at Intel and the Computer Security Laboratory at the University of California have devised a new way to counter zero-day attacks.

Researchers at Intel and the Computer Security Laboratory at the University of California have devised a new way to counter zero-day attacks.

Conventional antivirus software can detect known viruses, but is ineffective against new malware, or so-called zero-day attacks.

The new technique involves logging suspicious activity in individual computers on a network, and matching it against other connected systems.

"The question is whether I should shut down the network and risk losing business for a couple of hours for what could be a false alarm, or keep it running and risk getting infected," said Senthil Cheetancheri, a UC Davis graduate student who led efforts to develop the strategy.

"One suspicious activity in a network with 100 computers can't tell you much. But when you see half a dozen activities and counting, you know that something's happening."

The second part of the system is an algorithm that rates the cost of shutting down a computer against the cost of letting malware run loose on the network. The software can either allow the IT manager to make a decision, or be configured to take action automatically.

The system can also evaluate the importance of individual machines. For example, the cost of taking down a network server is much higher than for a seldom-used computer, so the algorithm would shut down the latter, less valuable, system first.

The team has developed an experimental detection engine and is now trying to make sure that it runs without hogging server time and bandwidth and interfering with other applications.
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
attacks computer intel laboratory security software zeroday

Partner Content

MSI launches business laptops with impressive battery life, style
Partner Content MSI launches business laptops with impressive battery life, style
IBM now offers sovereign security capabilities in Australia
Partner Content IBM now offers sovereign security capabilities in Australia
COVID puts agile IT under the microscope
Promoted Content COVID puts agile IT under the microscope
Why companies fail at picking cloud modernisation partners
Promoted Content Why companies fail at picking cloud modernisation partners

Sponsored Whitepapers

Is the technology refresh dead?
Is the technology refresh dead?
DevSecOps: A framework for digital innovation
DevSecOps: A framework for digital innovation
Encryption: Protect your most critical data
Encryption: Protect your most critical data
Overcoming data security challenges in a hybrid, multicloud world
Overcoming data security challenges in a hybrid, multicloud world
Move beyond passwords
Move beyond passwords

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • [Webinar] - Transformation versus compliance – a guide for CXOs
  • Masters of Microsoft Licensing
By Iain Thomson
Jan 16 2009
11:31AM
0 Comments

Related Articles

  • Software vendors would have to disclose breaches to US govt users under new order
  • Swiss hacker indicted after claiming credit for Nissan, Intel breaches
  • Google draws US antitrust scrutiny over third-party cookies ban
  • White House taskforce meets over Microsoft software weaknesses
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Vodafone hit by nationwide 4G outage

Vodafone hit by nationwide 4G outage

NAB's chief data officer Glenda Crisp leaves bank

NAB's chief data officer Glenda Crisp leaves bank

Westpac to offer smartphone-based identity verification group-wide

Westpac to offer smartphone-based identity verification group-wide

Virgin Australia rebuilds its IT leadership team

Virgin Australia rebuilds its IT leadership team

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.