Two new systems, Gooergia Tech's Titan malware analysis system and EPFL's malware origin tracing system, promise to deliver intelligence on malware attacks.

What Specially You're Expecting From Apple In This WWDC?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

Numerous malware plague millions of machines worldwide on an annual basis. This notorious pieces of software not only diminish the performance of the infected machines by sapping their resources, they are also known for phishing important and personal data of the users and organizations to cyber criminals.


Titan: GeorgiaTech Anti-malware System

The good news is that the security industry has been steadily working against the assault of these malware. So far, major developments on anti-malware front have been done mainly by the prominent anti-virus vendors. But, the security industry has failed in many cases to protect systems proactively. For instance, the recent discovery of Stuxnet, Flame and likes have shown how the crackers had been operating for years under the nose of commercial security systems.

The good news is that a number of other organizations, apart from these mainstream vendors, are working on anti-malware systems. Two such new developments are Gooergia Tech’s Titan malware analysis system and EPFL’s malware origin tracing system.

‘Titan’ malware analysis system at Georgia Tech

Researchers at Georgia Tech Research Institute have now created a new malware intelligence system called Titan. Titan is an extra-ordinary system in that it allows private as well as governmental organizations to anonymously submit data regarding any malware threats they face.

In this way, not only the members organizations are able to stay up-to-date with the prevalent malware threats, they also receive reports about the malware threats they submit. These reports include useful information such as the likely source of the threat, possible remedy and the potential harm and risks posed by it.

Such a central portal for malware threats and their analysis can be very useful in many ways. For instance, if multiple universities submit a common threat at Titan, Titan will be able to analyse and show that they are being targeted by certain attackers. In this way, Titan has the capacity not only to provide solutions to malware threats but also provide key analysis about them, analysis which can keep organizations safe in the long-run.

The project leader and branch head for malicious software analysis at GTRI’s Cyber Technology and Information Security Lab, Chris Smoak, says, “You are asking people to submit information about targeted attacks, so anonymity is built-in to the platform.” Smoak further states that there are no other known systems like Titan and that it fills a key gap in the security industry.

Swiss scientists create algorithm to trace malware

Researchers at Federal Polytechnic in Lausanne (EPFL), Switzerland, have been able to develop an algorithm which, they claim, can trace a malware back to its origin.

According to Pedro Pinto, who is a researcher at EPFL, “Using our method, we can find the source of all kinds of things circulating in a network just by ‘listening’ to a limited number of members of that network.” Essentially, this algorithm detects the path information takes, for instance when the suspicious sender sends a malware to a recipient, and based on this knowledge, detects the origin of the malware.

The interesting part is that the algorithm is not limited to discerning malware origins. It can also go on to predict terror suspects, Amazingly, Pinto claims that they tested their algorithm on the vast amounts of data related to 9/11 which is available. He says, “By reconstructing the message exchange inside the 9/11 terrorist network extracted from publicly released news, our system spit out the names of three potential suspects — one of whom was found to be the mastermind of the attacks, according to the official enquiry.”

The algorithm can also go on to identify the origins of spam, unwanted emails and a number of other online security threats. Without a doubt, this is a huge step forward in fighting off terror and criminals, online and offline.

Courtesy: Security Week/ Sky News

Buy Cheapest Related Product From Amazon.com


The Next Century Holds Many Disasters And Droughts – Climate Forecast

iPhone 5 Pre-Order May Start From September 12, Hit Stores On September 21
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On August 14, 2012(1 year, 11 months ago.)

Recent Products

Compare  
Buy Now | Compare  

What Do You Think?

Loading Disqus Comments ...
Loading Facebook Comments ...

Recent Search

Recent Tutorials

Want to repair your memory card? It's very easy to fix corrupted or damaged memory card. In fact you can fix it by yourself.
Are you the one who is frustrated because of the speed of your Android device? No worries, the article will help you increase the speed of that device.
Lately, Google has updated its Google Docs. Now users can crop, rotate, and add borders to images in a document without leaving Google Docs.
Adobe CS products are not free, but the good news is you can now download Photoshop CS2 & all other CS2 product completely free and it's absolutely legal.
At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook