Network World is reporting that Penn State University researchers have created technology they say can nab computer worms more quickly than traditional signature-based systems. This is done by watching for anomalous traffic patterns such as increased traffic rates to or from individual hosts.
From the article:
The Proactive Worm Containment technology watches for a packet’s rate and diversity of connections to other networks to identify worms, rather than having to wait around for a signature to be generated to spot new malware.
This technique can cut the time from identifying and capturing a worm from minutes to milliseconds, allowing for only a handful of infected packets to spread, the research team claims. That makes a big difference when you consider that notorious worms such as Slammer could issue 4,000 packets a second when attacking Microsoft’s SQL Server.
I had to read this article twice to try and understand how this “new technology” is different from present day Network Behavior Analysis (NBA) technology from vendors like Q1 Labs, Arbor Networks, Mazu Networks, and Lancope. Forcing myself to read it a third time still hasn’t convinced me that their methods are newer than anything out there today.
Also from the article:
The technology, now in beta testing and in the midst of being patented, isn’t just fast. It’s also smart. In the event that a high connection rate turns out not to be the sign of a worm, the security system can do its version of a mea culpa and release the packets upon recognizing the mistake, the researchers say.
I guess I will wait to see description used in the patent as well as a final product before I make final judgment but I fail to see how the methods being used are new.
After working with my contact at SANS for the last few weeks it’s finally official! From Thursday, April 5, 2007 to Thursday, June 7, 2007 I will be leading the Security 504: Hacker Techniques, Exploits and Incident Handling track here in Fredericton, New Brunswick, Canada.
I see this as a really big deal for the following reasons:
If you live in Fredericton, or the surrounding areas, and want to know more about this training sessions then please take a look at the following links:
If you do register please don’t forget to enter “MENTOR RECRUIT” into the Comments section during their online registration.
Also, if you’d like to learn more about the instructor (me) then please check out my About page and Resume. I look forward to seeing everyone there!
Both Richard Bejtlich and Harlan Carvey have expressed their concerns with the recent SANS NewsBites issue in which the new Certified Malware Removal Expert certification is announced:
Does anyone on your staff do an excellent job of cleaning out PCs that have been infected by spyware and other malicious software. We are just starting development of a new certification (and related training) for Certified Malware Removal Experts and we are looking for a council of 30 people who have done a lot of it to help vet the skills and knowledge required for the certification exam and classes. Email cmre@sans.org if you have a lot of experience.
I understand their concerns with this certification but their comments did make me think of something: “If we don’t need training on this topic what topics do we need training on?”
So these are my questions to you, the security community:
I would appreciate all of your comments and suggestions. If you do not wish to post your comments or suggestions to the blog then please feel free to email me directly at andrewsmhay@gmail.com. Perhaps we can even work together on getting these topics into some formal training.