website statistics

Two new systems, Gooergia Tech's Titan malware analysis system and EPFL's malware origin tracing system, promise to deliver intelligence on malware attacks.
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...

Numerous malware plague millions of machines worldwide on an annual basis. This notorious pieces of software not only diminish the performance of the infected machines by sapping their resources, they are also known for phishing important and personal data of the users and organizations to cyber criminals.


Titan: GeorgiaTech Anti-malware System

The good news is that the security industry has been steadily working against the assault of these malware. So far, major developments on anti-malware front have been done mainly by the prominent anti-virus vendors. But, the security industry has failed in many cases to protect systems proactively. For instance, the recent discovery of Stuxnet, Flame and likes have shown how the crackers had been operating for years under the nose of commercial security systems.

The good news is that a number of other organizations, apart from these mainstream vendors, are working on anti-malware systems. Two such new developments are Gooergia Tech’s Titan malware analysis system and EPFL’s malware origin tracing system.

‘Titan’ malware analysis system at Georgia Tech

Researchers at Georgia Tech Research Institute have now created a new malware intelligence system called Titan. Titan is an extra-ordinary system in that it allows private as well as governmental organizations to anonymously submit data regarding any malware threats they face.

In this way, not only the members organizations are able to stay up-to-date with the prevalent malware threats, they also receive reports about the malware threats they submit. These reports include useful information such as the likely source of the threat, possible remedy and the potential harm and risks posed by it.

Such a central portal for malware threats and their analysis can be very useful in many ways. For instance, if multiple universities submit a common threat at Titan, Titan will be able to analyse and show that they are being targeted by certain attackers. In this way, Titan has the capacity not only to provide solutions to malware threats but also provide key analysis about them, analysis which can keep organizations safe in the long-run.

The project leader and branch head for malicious software analysis at GTRI’s Cyber Technology and Information Security Lab, Chris Smoak, says, “You are asking people to submit information about targeted attacks, so anonymity is built-in to the platform.” Smoak further states that there are no other known systems like Titan and that it fills a key gap in the security industry.

Swiss scientists create algorithm to trace malware

Researchers at Federal Polytechnic in Lausanne (EPFL), Switzerland, have been able to develop an algorithm which, they claim, can trace a malware back to its origin.

According to Pedro Pinto, who is a researcher at EPFL, “Using our method, we can find the source of all kinds of things circulating in a network just by ‘listening’ to a limited number of members of that network.” Essentially, this algorithm detects the path information takes, for instance when the suspicious sender sends a malware to a recipient, and based on this knowledge, detects the origin of the malware.

The interesting part is that the algorithm is not limited to discerning malware origins. It can also go on to predict terror suspects, Amazingly, Pinto claims that they tested their algorithm on the vast amounts of data related to 9/11 which is available. He says, “By reconstructing the message exchange inside the 9/11 terrorist network extracted from publicly released news, our system spit out the names of three potential suspects — one of whom was found to be the mastermind of the attacks, according to the official enquiry.”

The algorithm can also go on to identify the origins of spam, unwanted emails and a number of other online security threats. Without a doubt, this is a huge step forward in fighting off terror and criminals, online and offline.

Courtesy: Security Week/ Sky News

Buy Cheapest Related Product From Amazon.com


The Next Century Holds Many Disasters And Droughts – Climate Forecast

iPhone 5 Pre-Order May Start From September 12, Hit Stores On September 21
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On August 14, 2012(3 years, 9 months ago.)

You May Also Like:

What Do You Think?

Leave a Reply




Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

Even if your iPhone is locked, people can reply from the lock screen. Check out, how to turn off the quick reply message from locked screen.
Have you forgot Apple ID password or having trouble signing in? Check out this tutorial to reset the password.
Even if iPhone is muted, still Siri's voice is loudly chime. Now you can change the setting to silence Siri using your iPhone's mute switch.
Check out how to teach Siri about nicknames and relationships of the important people in your life in order to make your life easier.
Has your iPhone suddenly turned black & white? Check out this tutorial to know possible reasons & how to fix iPhone screen with few taps.
Check out this tutorial to download FREE movies and TV Shows streaming Showbox app and install it on your Android smartphone or tablet.
Parental Controls allows you to put restrictions on apps or content that can or can not be used by anyone else on your Apple iPhone or iPad.
If you want to print from iPhone without using any computer, check this out to connect and print wirelessly right from the Apple device.
Using Siri, anyone can bypass the Passcode even if iPhone or iPad is locked. Check out this to know how you can disable Siri on lock screen.
Floatify will let you quick reply to the messages or emails through notification bar using your Android Lollipop or Marshmallow.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook