Stopping Malware Before It Hits 163
SpudGunMan writes "John Lockwood, Ph.D, an assistant professor of computer science at Washington University, and the graduate students that work in his research laboratory, have developed a hardware platform called the Field-programmable Port Extender (FPX) that scans for malware transmitted over a network and filters out unwanted data."
hah (Score:5, Funny)
mirror (Score:2, Interesting)
By Tony Fitzpatrick
A computer scientist at Washington University in St. Louis has developed technology to stop malicious software - malware - such as viruses and worms long before it has a chance to reach computers in the home and office.
John Lockwood, Ph.D, an assistant professor of computer science at Washington University, and the graduate students that work in his research laboratory have developed a hardware platform called the Field-programmable Por
Wow (Score:2, Interesting)
Re:Wow (Score:2, Informative)
Re:Wow (Score:1)
I think you are being very generous to him. Personally, I think he just "invented" the managed switch. After all you could do exactly this:
'Each FPX device then filters traffic passing over the network, so that it can immediately quarantine a virus or Internet worms within sub networks (subnets). By just installing a few such devices between subnets, a single device can protect thousands of users.
With a Cisc
Re:Wow (Score:2)
2) I don't use Cicso IOS as much as I'd like, can Cisco IOS really scan for virus signatures in the traffic being passed through?
RTFA (Score:2, Informative)
And:
'The FPX itself fits within a rack-mounted chassis that can be installed in any network closet. When a virus or worm is detected, the system can either silently dr
Re:Wow (Score:1, Insightful)
It's implemented in hardware and using FPGAs, which can be reprogrammed. Think of it as dynamic hardware based IDS. 2.4 Gigabit speeds...I'd love to see snort handle that.
From the time you get a pattern of a new virus to the time it can be deployed to the system is ~ 10 minutes according to the paper. that is impresive considering it's all hardware based.
Re:Wow (Score:5, Interesting)
I'm waiting to see a nice open source/free IDS that would allow per protocol specifications so you could not only catch known viruses/exploits but also put in checks based on the protocol. For example you have an ftp server, you load up the ftp protocol module and it knows that the user field should be followed by a username, but that the username should be less than say 256 characters, so if someones tries to exploit some buffer overflow in the username for your ftp server the system would block it before it even got to the server. Also you could use them to remove identification information, so your service banner that identifies what is being run would be stripped for anything behind your IPS.
A great idea, but..... (Score:5, Insightful)
Also, shouldn't they make a cheap version for home users since those are the machines that are most vulnerable?
Re:A great idea, but..... (Score:2, Insightful)
> the end user or the company that make the device?
The virus writer.
Re:A great idea, but..... (Score:2)
If you filtered connections individually you'd need millions of these things. Instead you filter at the upstream provider where a single unit can filter for thousands of individuals.
Re:A great idea, but..... (Score:2, Interesting)
Who gets to decide what is malware?
Re:A great idea, but..... (Score:2)
Re:A great idea, but..... (Score:2)
Re:A great idea, but..... (Score:5, Insightful)
- If the same e-mail attachment comes through your network a few hundred times, it must be a virus.
- If the same kilobyte-long web address keeps getting requested, it must be a worm.
- If the same messages are headed to your NetBIOS ports, it must be the pop-up-message spam of the week. In fact, if somebody wants to deliver any message any kind to all of your ports one-by-one, it must be the exploit of the week.
This seems to be all about patern matching... the device isn't meant to replace your firewall and antivirus systems, but to be faster than them and to take off the work load of having to identify this week's worm when it comes in for the 34,939th time. This might even be useful for ISPs to cut off D-DOS attempts before entering the major traffic exchages so that less of traffic makes it to the victim's bandwidth pipe.
Re:A great idea, but..... (Score:2)
Or a chain letter... though I think many of us can agree that these are evil anyways...
If the same kilobyte-long web address keeps getting requested, it must be a worm
Kilobyte-long? I don't know if worms all use long addresses, but a lot of people (or even a given machine) requesting the same address could apply to update sites, like virus updates? Amend this into "during time frame X" cuts it down a bit,
Re:A great idea, but..... (Score:2)
- If the same kilobyte-long web address keeps getting requested, it must be a worm.
The problem with this type of approach is that you won't recognize that "the same message keeps appearing" until you've seen it at least twice. That's too late since the first occurrence will infect the target machine. Once the virus is behind your IPS you may as well not have one.
Re:A great idea, but..... (Score:2)
Nifty. (Score:5, Insightful)
Re:Nifty. (Score:2, Insightful)
Or you could carefully configure the router / firewall at the front of your network (like according to RFCs?!?). Everybody is looking for something to eliminate the burden of proper management / administration. Hows about people read the RFCs know their OSes and their limitations and create management strategies accordingly.
Re:Nifty. (Score:2)
In other words, the FPX could scan every word in the entire works of Shakespeare in about 1/60th of a second.
Yes, but how many Libraries of Congress can it scan per second?
Re:Nifty. (Score:1)
Yeah it would be amazing to have network traffic management, firewall functionality all in one handy box.... I can see a big multi billion $$$ market for this.... oh wait.....
Treating the symptoms, not the disease (Score:5, Insightful)
I suggest enlightening the users about malware while they download it. Let's go for the Pavlov effect and hook the hardware platform up to a pellet gun, tazer and a program which mails the squid logs of the current day of said victim to his/her mother/SO. Users learn so much easier that way...
it's the freeware, stupid (Score:5, Insightful)
I am not against freeware -- far from it. However, I would say that there is freeware addiction out there that opens the doors to malware. Moreover, I am not against this product; it will certainly be helpful. Yet, those who put their trust in yet another algorithm will certainly get bit again, albeit in some other way.
cheers, potor
Re:it's the freeware, stupid (Score:2, Insightful)
Try only running software without an EULA. It tends to work better, and in general it's less of a worry.
When an installation program starts up, the first few words should be "GNU GENERAL PUBLIC LICENSE Version 2, June 1991", and you can be pretty sure that the software is good to install. (all we need now is GPL'd malware to really put people off, but for now
torrentSearch is an example... (Score:2)
Re:it's the freeware, stupid (Score:2)
Re:it's the freeware, stupid (Score:2)
"such as" does not limit the set of target programs to viruses and worms; in fact, it expands the set beyond them. it just so happens tha
Some questions: (Score:2, Insightful)
2) How do you plan to adapt your hardware once the creators of Malware adapt to yours?
3) How much will this *really* slow down a LAN or Intranet? Not "it shouldn't slow it down at all" -- I mean real-world tests?
Re:Some questions: (Score:3, Insightful)
Because you don't always have control of the computers which will be running the virus?
"How do you plan to adapt your hardware once the creators of Malware adapt to yours?"
The article mentioned that it took less than 9 minutes for someone familiar with the web interface to add a new rule.
"How much will this *really* slow down a LAN or Intranet?"
Read the article (or the linked paper) for precise figures. I
Re:Some questions: (Score:5, Interesting)
Prevention, thats why.
Killing the packets before they arrive means more signal within the noise (look at my apache log for all those code red machines on comcast's network for instance), saving time and money by having less sys admins fighting malware 24/7, helping the technoproles out by the fact that the less viruses they are able to get the less trouble they'll have in the long run.
Lastly, because what you mentioned isn't working.
>How do you plan to adapt your hardware once the creators of Malware adapt to yours?
Same is true with the methods you mention that you suggest work just fine. The Ad Aware people and the AV people are always fighting the cold war too. So are the anti-spam people. Another piece of tech that helps is a win for the good guys.
> How much will this *really* slow down a LAN or Intranet?
If it works like its described it would actually speed up malware infested LAN and WAN connections.
Re:Some questions: (Score:3, Informative)
>...because what you mentioned isn't working
Perhaps because of the end user? How many joe sixpacks do you know with a properly configured firewall, an up-to-date AV program, and have even heard of AdAware?
>>How do you plan to adapt your hardware once the creators of Malware adapt to yours?
>Same is true with the methods you mention that you suggest work just fine. The Ad Aware people a
Lets stop blaming the victim (Score:2)
Classic blame the victim mentality. How has the industry served "joe sixpack" pray tell? This game has gone on long enough, we're looking at 4-months before an MS patch reaches critical mass in corporate america and even longer times in the residential market. Instead of constantly berating the end-user, someone has come up with a better sol
any users of systems i've built (Score:2)
Seriously, all are available free: put them on your family's PCs and educate them in their usage. Kerio Personal Firewall's reasonably idiot-proof, AVG antivirus excellent, and AdAware 6 just works. All free for personal use...
Now, all we need is the big OEM people to ship with their PCs and provide a quick tutorial.
Re:Some questions: (Score:2, Insightful)
So windows.... (Score:5, Funny)
What about Windows-update?
These are hard questions that we need to know...
How about Gator? (Score:1)
But when I RTFA, I see that it's only good for worms and viruses. I'll take worms and viruses any day over Gator. You know, because GATOR IS SPYWARE [slashdot.org]. bwahaha.
Which brings me to the question:
Can you write your own virus def's? I'd like to see an app that edited your favorite virus scanner's defs and added signatures for Gator, WhenU, etc. That would be so cool.
----------------------
VIRUS DETECTED!!
Win32.
a new worm will come out and this (Score:2, Insightful)
unless it has an update. Same problem
for antivirus software. A new worm will
get past it until they teach the device to see it. snake oil.
Re:a new worm will come out and this (Score:2)
Re:a new worm will come out and this (Score:1)
Or if his overpaid but cost-conscious (read that cheap) ISP hires a CCIE who can write ACLs and log ISPs sending deleterious traffic.
Perhaps ISPs could behave like a community (like in the early 90s). Joe Routeradmin from abc.isp could notice inhis logs that xyz.isp is transmitting on port 135 constantly, instead of just blocking him, he could contact them.
Re:a new worm will come out and this (Score:2)
Re:a new worm will come out and this (Score:2)
Monitoring, traffic=alert (Score:2)
Hey, traffic just went up 400% on port 237 across 100 different hosts - it could go into "red alert" mode.
Red alert meaning that it increases its update-schedule unless an admin flags the traffic as non-virus.
Red Alert could mean to contact home-base every 5-10 min until a fix arrives. Alternately it could mean "login to homebase, leave a log in homebase's DB that I am looking for an update for heuristics X/Y/ZZ, and tell homebase to contact me when an up
Last year... (Score:2)
May be useful... (Score:1, Insightful)
How it works (Score:5, Funny)
As part of the TCP/IP connection specification, Each Ethernet Cable has 65,536 exactly small fibers. To send data, a prgoram must tell the network card to "pluck" the fibers 5000 tines a second to send data.
Now Viruses pluck usually unused fibers to confuse the Network card. Once it is confused the virus can Execute it self by running on the firmware of the Ether, which sends rouge Assebly instructions to the GBX register on the CPU which is an illegal instruction. This disables the ECIR and RIF jumpers on the motherboard. Then it can pluck all the wires at the same time, which of course causes a D-DOS attack.
Now you know how it works, get a Firewall to stop the wrong fiber being plucked.
Re:How it works (Score:1)
What utter marketroid-fuelled drivel. (Score:3, Insightful)
This product seems entirely built upon PHB fear of technology - its a rack mounted unit that scans network traffic looking for rogue packets/signatures. So to do this effectively, you'd need one of these devices in place _for every router, firewall and computer to computer connection_ - along with some way to travel into the future to obtain the signatures of the all the viruses of the future.
I just don't see how this is securing a network against viruses and worms. The best thing corporates can do (who I guess this particular piece of IT jewelry is aimed at), is lock down the desktop as far as they can go, and have a sensible patch system in place to roll out automagically.
I mean, when "Travelling Salesman Dixie" brings his laptop back from the wild of the Sales Conference and plugs it in, do they honestly think that having it in hardware, rather than software, will cover their asses?
Full marks for receiving funding though. I'm probably just bitchy cos I didn't think of it.
Re:What utter marketroid-fuelled drivel. (Score:1)
Re:What utter marketroid-fuelled drivel. (Score:4, Insightful)
Sure you need to update the thing as new viruses come out, but you need to do the same thing with your AV software, that doesn't make it worthless. This won't stop virus' and worms from being written, but it can stop them from spreading past day 2.
Re:What utter marketroid-fuelled drivel. (Score:2)
With this device he can update the definitions once and cover the entire office, whithout this device he has to get every single workstation updated. Which is easier? Even if your office _is_ already infected, this can help ensure that your offi
Re:What utter marketroid-fuelled drivel. (Score:2)
Generally they'll be smarter than the people *buying* these devices, but they're not very often smarter than the people who create and write updates for these machines.
The only hurdle is to consistently get these updates into the wild, this is a step in that direction.
Re:What utter marketroid-fuelled drivel. (Score:2)
This won't stop the first contacts with a new virus, but it can certainly contain them, which is really the best you can ask for, and all that's neccesary anyway.
Poor article title (Score:2)
An easier way to stop Windows malware: (Score:4, Funny)
Re:An easier way to stop Windows malware: (Score:4, Funny)
Oh, great. (Score:5, Insightful)
If something like this is ever implemented on a wide scale, expect the system to refuse to allow random non-malware files to be used, transferred, or handled, in those cases where they happen to match a banned bit-pattern. Files and emails might even be silently dropped with no notification at all, depending on the implementation (and with an eye to history).
RTA (Score:2)
"When a virus or worm is detected, the system can either silently drop the malicious traffic or generate a pop-up message on an end-user's computer. An administrator uses a web-based interface to control and configure the system."
So no, you don't have to worry about false positives making you miss something unless you tell it to not warn you before doing something.
Ben
Re:RTA (Score:1)
That sounds, ummm, interesting. So all client machines have this program listening for pop-up messages, and some unknown box out in a middle layer somewhere on the network is configured to automatically open up these 'pop-up messages.'
When you're not in lockstep running the software your ISP approves and running their little pop-up client (malware??) your messages just are silently dropped?
Re:Oh, great. (Score:4, Insightful)
It seems to me that this is just more evidence that computer systems will wind up looking like biology. First we had viruses and similar infectious things. Now people are trying to create the machine equivalent of an immune system. The problem is that in the process they're likely to rediscover all of the problems that our immune system causes as well as the benefits.
This particular case is quite similar to allergies in the natural immune system. It's an overly aggressive response to an essentially harmless signal. The big problem is that virus and worm scanners are going to be succeptible to the computer equivalent of autoimmune disease; they'll start thinking that essential system files have been corrupted and try to wipe out something really important. I just hope they never develop the computerized equivalent of leukemia.
advantages (Score:5, Interesting)
Re:advantages (Score:1)
A hardware device is usually harder to hack than the software platform doing checking. A clever piece of malware can compromise the checking machine itself.
Nothing to stop a clever piece of malware fscking up the hardware (which after all, is ultimately a computer and vulnerable to algorithmic weaknesses just as your standard von neuman architecture general purpose processor).
If checking is done by a secondary machine, by the time it detects the malware the infected mach
Re:advantages (Score:1)
Re:advantages (Score:2)
Exactly right. The difference is that it shifts the burden from the clueless end user to a group of knowledgeable professionals who's
Sounds great. (Score:5, Insightful)
Quoting from the abstract of the paper:
FPGA logic is used to implement circuits that track the state of Internet flows and search for regular expressions and fixed-strings that appear in the content of packets.
So apparently this hardware can only recognize patterns programmed beforehand (which makes a lot of sense). However, a problem would arise whenever an original piece of malware is released into the net. I mean, how do they plan to identify and program new strings into the machine before the systems behind it are infected? Worms tend to expand fairly quickly...
Further insight is always welcome.
R.Re:Sounds great. (Score:2)
However, once those new worms and virii are dissected, then they can take action. An FPGA is a exactly that -- Field Programmable Gate Array. I assume they choose FPGAs instead of ASICs because they intend to re-program in the field. Then this baby can sit on your network and squish the new problems along with the old, preventing further infection.
I think that's the intended mode of operation. Kinda
Isn't this just a network censorship device? (Score:5, Insightful)
This device appears to be, at heart, a box that is put in along side the routers to filter out content that the owner of the device does not want to be sent over the network. It is capable of looking for specific patterns of data and blocking the transfer of the data based on that in real time.
Is this not precisely what one would use to filter out, say, unwanted political documents going in/out of China? To, say, spot a specific MP3 file being traded on a P2P network and stop it?
Other comments seem to suggest people think this might actually be a workable, good idea -- guess folks are finally realizing that the Internet cannot route around all forms of censorship after all, if they think this will work.
Re:Isn't this just a network censorship device? (Score:2)
However, I'm sure more people would complain if they couldn't download an MP3 than if they fail to receive a SoBig worm. (it's "legal" to download music here in Canada, after all)
Re:Isn't this just a network censorship device? (Score:5, Interesting)
I don't really like the notion of my ISP actively grepping every packet I send and selectively deleting some of them that match some rules. Sure, I don't care if it ONLY messes with malware, as that would never affect me since I keep a tight ship. But, what if someone programs a really sloppy or poorly written rule, and there are false positives? What if the ISP decides that it wants to start deleting other things, like p2p traffic that's taking up all that bandwidth? Again, this is different from blocking p2p ports outright, which, while still repulsive, would at least alert you to the fact that something's being blocked since you wouldn't be able to establish a connection on the blocked ports.
Now, on a corporate/university LAN I can see a lot fewer issues. For one thing, it's a case of "their net, their rules" in that you really have no rights (in the case of the workplace) to complain about what's filtered and what isn't. But workplaces tend to already have some form of firewall or other preventative measures in place. Not that this wouldn't help, but the real case for something like this is a consumer broadband ISP, where a single installation could potentially isolate and neuter thousands of infected home boxes of people running a stock Windows 98 with no updates and no firewall.
Already seen it (Score:2)
Someone goofed, and the rule to flag requests for things like
In our case, it was particularly annoying because the entire intranet used a webpage template that had dozens of references to "shadow.gif" (I think it was for bordering and layout). The
Re:Isn't this just a network censorship device? (Score:2)
Yeah, this won't merely raise the bar and get everyone using trivial fixed key encryption (or of all things, compression!).
Sarcastic people aren't viciously mocking this.
Re:Isn't this just a network censorship device? (Score:2)
I wish I saw this story when it first came out. If you check the PDF [wustl.edu] on page 6 you will see a sample image listing an entry for "Copyrighted movie" and that entry belongs to "Movie Company". On page 10 it says:
A system has been developed that not only blocks the spread of Internet worms and computer viruses, but also
Cheaper solution (Score:2, Funny)
As an alternative solution, you can hire a big, fat, bald guy, whose job is to push the Microsoft and Oracle salesmen down the stairs.
Fantastic! (Score:3, Funny)
Finally, a solution to my Halting Problem!
sounds like malware to me (Score:1, Troll)
-what? is this thing live? I love Big Brother.
Re:sounds like malware to me (Score:2)
What if someone wants to filter competitive data (Score:3, Interesting)
It's NOT a censor-box, it's a Good Thing (Score:3, Informative)
By using FPGAs to scan network traffic (not a new idea, by the way), the device looks for fixed signatures much faster than an equivalent software solution can do so (yes, software may control it, but the actual "decisions" are made by hardware. Think level 3 switch). I'm guessing there's probably some sort of state engine implemented in the FPGAs (I haven't kept up on field-programmable logic), and optimization to lo
Software versus hardware? (Score:2, Funny)
Riiiiight.... So what exactly is controlling the hardware? Lemme guess... A few lines of code, some syntax, some commands... You know... Software.
"Maybe if we put our system in a shiny box with cool LEDs instead of a rackable server like everyone else, we can call it breakthrough technology!"
Step 1: Reinvent the wheel.
Step 2: Patent it.......
etc.
Re:Software versus hardware? (Score:1)
I think you get the point.
Dedicated hardware is faster and uses less electricity. Yes , it uses software.
This actually works... (Score:4, Funny)
one of the major selling points of watchguard products when they were initially introduced was the fact that the appliance was bright red, and had a lot of blinky leds on the front plate
Shiny blinky things (Score:2, Interesting)
Snort (Score:2)
http://cerberus.sourcefire.com/~jeff/archives/s n or t/sp_respond2/
to quote:
Active response is not guaranteed to sucessfully terminate connections. Snort is a passive
system, except when used in 'inline' mode. In a passive configuration, the process of active
response is a race between Snort and the endpoints in network communication. Depending
on the CPU and/or bus speed of a system running Snort, av
Re:Snort (and hogwash) (Score:2)
Expensive? (Score:2)
Re:Expensive? (Score:2)
Re:Expensive? (Score:2)
An IDS on a FPGA (Score:3, Interesting)
Re:An IDS on a FPGA (Score:2)
yah, right. (Score:1, Insightful)
Typical academia (Score:1)
Software-based products already can handle the 2.4-gbps rate this "hardware" solution claims. So there is nothing new there.
Moreover, this solution doesn't handle important problems such as fragmentation of packets or polymorphic coding techniques -- both widely used by hackers, but handled by existing network intrusion detection systems.
Most importantly, it doesn't handle the fact that most troj
Cowboy Neal Uses Windows 98 (Score:2, Funny)
Stopping network junk "on the wire" (Score:5, Insightful)
As an example of the current waffle on this topic, the white paper at ddos.com promises in one of their upcoming *cough* products a wire-speed spam filter which is 100% accurate and needs no training. Sure, sure... it's this ridiculous claim which calls into question the "zero training" aspect of their DDoS prevention-- I'm sure some configuration and known "signature" patterns of abusive traffic will help matters.
I'm not here to pick on ddos.com, I'm sure they have an excellent and useful product. But since they are one of a very small number of people with such a product, they are prone to making wild claims and charging extortionate fees. I'm convinced a Linux/BSD kernel module could achieve the same effect and I'd be very interested to see the algorithms, training and so on needed to achieve it. But for the moment we're still subject to these pretty wild claims without much in the way of algorithmic detail.
FUD? (Score:2, Insightful)
Maybe I'm misinformed but I thought that a worm like MSBlast and Co. attacks thru SMB/CIFS protocols by the 13x familily of ports. Any self-respecting netadmin blocks those from
Definately hype (Score:2)
Set up an XP laptop that had been offline for a few months, and thus was behind in security updates. Connected to broadband, modem-->switch-->machine, download patch from my own server where I had a cut+paste URL ready to go. Halfway through download, machine reboots, it's been infected. Total time, under 5 minutes.
Setting up new machine with XP installed, same scenario as above.
Setting up 2 machines behind linux box, no infections. Not just a linux solution, I believe even a cheap
I know one of the guys on the project (Score:2)
Anyway, you can find out all about their project at the applied research labratory FRX website:
http://www.arl.wustl.edu/arl/projects/fpx/ [wustl.edu]
More about the FPX (Score:2)
Neat, but even simple measures aren't used (Score:2)
better idea (Score:1)
We need a 'do not call list' with teeth for the wwb.