Researchers tout zippier way to squash computer worms

New technique cuts time of identifying and capturing a worm from minutes to milliseconds

Penn State University researchers have created technology they say can nab computer worms more quickly than traditional signature-based systems and speedily set free the traffic if it's determined to be harmless after all.

The Proactive Worm Containment technology watches for a packet's rate and diversity of connections to other networks to identify worms, rather than having to wait around for a signature to be generated to spot new malware.

This technique can cut the time from identifying and capturing a worm from minutes to milliseconds, allowing for only a handful of infected packets to spread, the research team claims. That makes a big difference when you consider that notorious worms such as Slammer could issue 4,000 packets a second when attacking Microsoft's SQL Server.

"A lot of worms need to spread quickly in order to do the most damage, so our software looks for anomalies in the rate and diversity of connection requests going out of hosts," said lead researcher Peng Liu , an associate professor of information sciences and technology at Penn State, in a statement.

The technology, now in beta testing and in the midst of being patented, isn't just fast. It's also smart. In the event that a high connection rate turns out not to be the sign of a worm, the security system can do its version of a mea culpa and release the packets upon recognizing the mistake, the researchers say.

The technology can also be used in conjunction with signature-based detection systems to squelch slow as well as fast-moving worms.

Penn State researchers are putting lots of resources and brainpower toward making networks more secure. Other researchers at the school last year touted technology designed to enable databases to talk without giving away secrets to each other.

The university's Privacy-preserving Access Control Toolkit (PACT) relies on encryption of queries and data transmitted to protect sensitive information, including metadata. PACT is discussed in a paper called "Privacy-preserving Semantic Interoperation and Access Control of Heterogeneous Databases."

Join the PC World newsletter!

Error: Please check your email address.

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Bob Brown

Network World

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?