SlideShare ist ein Scribd-Unternehmen logo
1 von 20
PROMIS - a PROactive
Malware Identification
System
Vasileios Vlachos
Alexandros Papanikolaou
Fotis Liatsis
Crowdsourcing
crowd·sourc·ing:
to utilize (labor, information, etc.) contributed by the general public
to (a project), often via the Internet and without compensation



Can you guess the exact weight of an ox



…or



the exact number of the beans in a jar
Crowdsourcing
   Probably none of us could do it right
   ...but all of us together is another story…


Crowdsourcing uses the collective wisdom of the
crowds as it collects large amounts of information
    and aggregates it to gain a complete and
accurate picture of a topic, based on the idea that
a group of people is often more intelligent than an
                     individual                       Photo (CC-BY) James Cridland.
Crowdsourcing
C’mon be serious, who cares about oxen
and coffee beans in jars ?




Apparently the USS Navy (Dr John Craven was
appointed with a group of scientists) to locate the
missing USS Scorpion in the Ocean
…as well its two nuclear torpedoes.
                                  Bow section of the sunken Scorpion containing two nuclear
                                        torpedoes on the sea floor. US Navy photo.
Crowdsourcing
Yeah but that was old time ago
๏   DARPA Network Challenge 2009
Ten red balloons were released in various places in the US and the
participants had to get the exact coordinates of the ballons.

๏   Tag Challenge, funded by the US State
    Department 2012
Three out 5 individuals in 5 different cities were identified

and found from volunteers using crowdsourcing

                                                                  New York
                                                                Washington DC
                                                                  Bratislava
                                                                 Stockholm
The Problem: Computer
viruses… and worms
A computer worm is a standalone malware computer program that replicates itself
in order to spread to other computers. Often, it uses a computer network to
spread itself
         Code Red 12h                                Slammmer 10m
Computer Viruses
 The lifecycle of an antivirus signature
 1.   Collect a suspicious file

 2.   Analyze the suspicious code

 3.   Create a virus signature

 4.   Test the signature to avoid identifying legitimate
      applications as malware

 5.   Push the update to the software clients



 How much time do we need to complete the above steps?
PROMIS - a PROactive Malware
Identification System
๏   PROMIS is an Early Warning System for rapidly-spreading
    computer viruses

๏   PROMIS is a small software application which transform a
    PC in to a sensor

๏   PROMIS needs only to have access to the log file of the
    security applications (Firewall and AntiVirus), no sensitive
    data are even read

๏   PROMIS combines the basic concepts of crowdsourcing,
    biodiversity with epidemiology and public health (after
    all computer viruses have striking similarities with biological
    viruses)

๏   PROMIS act preactively in order to protect against
    unknown threats and buys some time to user and AV
    vendors to provide signatures, patches and updates
The Question: Biodiversity vs
Monocultures
๏    Monoculture is the agricultural practice of producing or growing a
     single crop or plant species over a wide area and for a large number of
     consecutive years. In the field of computer science, monoculture is a
     community of computers that all run identical software. All the
     computer systems in the community have the same vulnerabilities,
     and, like agricultural monocultures, are subject to catastrophic failure in
     the event of a successful attack.

๏    This concept is significant when discussing computer security and
     viruses. In particular, Dan Geer has argued that Microsoft is a
     monoculture, since a majority of the overall number of computers
     connected to the Internet are workstations and servers running
     versions of the Microsoft Windows operating system, many of which
     are vulnerable to the same attacks. Biodiversity on the hand utilizes
     different software and hardware architectures provides us with
     significant and useful information

๏    Monocultures can lead to the quicker spread of diseases

                                     but

๏   also keep costs down (economies of scale, standardization etc)
The Problem: Computer
Viruses
If a system isn’t vulnerable then the virus / worm attack is
recorded in the Antivirus / Firewall Log File

An increase in the rate of attacks might indicate

๏   Technical malfunctioning

๏   A targeted attack

๏   A virus epidemic
PROMIS - a PROactive Malware Identification
System
                                 Locally intercepted
PROactive                         malicious activity
                                                       k

                                                   åh          n
                                                               i
Malware                                   htn -    i= t- k

                                  ptn =                    k
                                               k

Identification                               åh            n
                                                           i
                                             i= t- k
                                                   k
System
                              Estimation of Internet threa
                                         level
                                                           n

                                                       åP          t
                                                                       i


                                      pavg =           i=1
                                                               n
PROMIS - a PROactive Malware
Identification System
PROMIS - Countermeasures

If the threat level exceeds a pre-defined threshold
autonomously increase or decrease the security level by
• Activating / deactivating useful but not critical services
• Increase / decrease the security client of the browser /
     e-mail client
• Enable / disable types of content which are known
     infection vectors (Flash, Java, VBA, javascript etc)

Instead of trying to create vaccines (signatures) for any
new unknown computer virus we follow simple public
health approaches. Take some basic precautions until the
storm weather out (and or a cure or a vaccine is
ready)…just like the flow
Proof of concept prototypes I

               Java 1.4

               JXTA 1.1

NetBiotic     Windows XP
                 Linux

              Outwit tools
Proof of concept prototypes II
            Windows XP SP1

            MSP2P API

            C#, C++
MSPROMIS    ICF

            Outwit tools
Simulation
The simulator works fine (output close to the analytical
solution) as well some other software tools that we have
built
Simulation
A sufficient number of nodes survives the
infection according to the experimental
results
Conclusions
What do we need from you?
Your feedback, as well as your help to increase
our project’s visibility, because in order to build a
crowdsourcing application you know we need….a
crowd !



Your ideas about a possible business plan to
facilitate the development and support of the
platform for sufficient time to attract adequate
users
Summary
Some publications so no patents at all, sorry!
๏       Vasileios Vlachos, and Diomidis Spinellis, A PRoactive Malware Identification System based
        on the Computer Hygiene Principles, Information Management & Computer Security,
        15(4):295–312, 2007. (doi:10.1108/09685220710817815)

๏       Vasileios Vlachos, Stefanos Androutsellis-Theotokis and Diomidis Spinellis, Security
        Applications of Peer-to-peer Networks, Computer Networks (Elsevier Science), Volume 45,
        Issue 2, pp 195-205, June 2004. (doi:10.1016/j.comnet.2004.01.002)

๏       Vasileios Vlachos, Andreas Raptis, and Diomidis Spinellis PROMISing steps towards
        computer hygiene.", In Steven Furnell, editor, International Network Conference (INC2006),
        pages 229-236, July 2006, Plymouth, UK.

Is the outcome of the PhD work of the 1st member under the supervision of Professor Diomidis
Spinellis

๏   PhD Thesis, "Security Applications of Peer to Peer Networks", Athens University of Economics and
    Business (AUEB), Athens, July 2007
Summary
   Our team:




     Vasileios Vlachos      Alexandros Papanikoalou
Professor of Technological         Researcher                    Fotis Liatsis
       Applications        Technical University of Crete    Undergraduate Student
Technological Educational                                  Technological Educational
    Institute of Larissa                                      Institute of Larissa

Weitere ähnliche Inhalte

Was ist angesagt?

A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internetUltraUploader
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...UltraUploader
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superwormUltraUploader
 
Apt presso good to learn
Apt presso   good to learnApt presso   good to learn
Apt presso good to learnFajar Isnanto
 
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTICVIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTICijcsit
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploitsecarrow
 
Is Information Security Worth It?
Is Information Security Worth It?Is Information Security Worth It?
Is Information Security Worth It?martin_lee1969
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitPR Americas
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDIJCNCJournal
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Search Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software DiversificationSearch Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software DiversificationFoCAS Initiative
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Tammy Clark
 
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareCommercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareAditya K Sood
 
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...Mrunalini Koritala
 
Virtualisation-based security countermeasures in software runtime systems
Virtualisation-based security countermeasures in software runtime systemsVirtualisation-based security countermeasures in software runtime systems
Virtualisation-based security countermeasures in software runtime systemsFrancesco Gadaleta
 
2009 Kl Cybercrime Kaspersky
2009 Kl Cybercrime Kaspersky2009 Kl Cybercrime Kaspersky
2009 Kl Cybercrime KasperskyICTloket.be
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revistathe_ro0t
 

Was ist angesagt? (20)

A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
 
Apt presso good to learn
Apt presso   good to learnApt presso   good to learn
Apt presso good to learn
 
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTICVIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Is Information Security Worth It?
Is Information Security Worth It?Is Information Security Worth It?
Is Information Security Worth It?
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
 
Pc viruses
Pc virusesPc viruses
Pc viruses
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Threat Report H2 2012
Threat Report H2 2012Threat Report H2 2012
Threat Report H2 2012
 
Search Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software DiversificationSearch Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software Diversification
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
 
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareCommercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks Malware
 
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
 
Virtualisation-based security countermeasures in software runtime systems
Virtualisation-based security countermeasures in software runtime systemsVirtualisation-based security countermeasures in software runtime systems
Virtualisation-based security countermeasures in software runtime systems
 
2009 Kl Cybercrime Kaspersky
2009 Kl Cybercrime Kaspersky2009 Kl Cybercrime Kaspersky
2009 Kl Cybercrime Kaspersky
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 

Andere mochten auch (16)

Promes kelas9
Promes kelas9Promes kelas9
Promes kelas9
 
Байгууллагад KPI-ыг нэвтэрүүлэх нь
Байгууллагад KPI-ыг нэвтэрүүлэх ньБайгууллагад KPI-ыг нэвтэрүүлэх нь
Байгууллагад KPI-ыг нэвтэрүүлэх нь
 
HRON110- Хичээл 15
HRON110- Хичээл 15HRON110- Хичээл 15
HRON110- Хичээл 15
 
HRON110- Хичээл 13
HRON110- Хичээл 13HRON110- Хичээл 13
HRON110- Хичээл 13
 
HRON110- Хичээл 14-үргэлжлэл
HRON110- Хичээл 14-үргэлжлэлHRON110- Хичээл 14-үргэлжлэл
HRON110- Хичээл 14-үргэлжлэл
 
HRON110- Хичээл 11
HRON110- Хичээл 11HRON110- Хичээл 11
HRON110- Хичээл 11
 
HRON110
HRON110HRON110
HRON110
 
HRON110
HRON110HRON110
HRON110
 
HRON110- Хичээл 9
HRON110- Хичээл 9HRON110- Хичээл 9
HRON110- Хичээл 9
 
HRON110- Хичээл 14
HRON110- Хичээл 14HRON110- Хичээл 14
HRON110- Хичээл 14
 
EEON103 Хичээл 14
EEON103 Хичээл 14EEON103 Хичээл 14
EEON103 Хичээл 14
 
Ажлын гүйцэтгэлийн үнэлгээ
Ажлын гүйцэтгэлийн үнэлгээ Ажлын гүйцэтгэлийн үнэлгээ
Ажлын гүйцэтгэлийн үнэлгээ
 
Performance Management
Performance ManagementPerformance Management
Performance Management
 
хүний нөөцийн төлөвлөлт
хүний нөөцийн төлөвлөлтхүний нөөцийн төлөвлөлт
хүний нөөцийн төлөвлөлт
 
ажлын байрны тодорхойлолт, шинжилгээ
ажлын байрны тодорхойлолт, шинжилгээажлын байрны тодорхойлолт, шинжилгээ
ажлын байрны тодорхойлолт, шинжилгээ
 
хүний нөөцийн менежмент
хүний нөөцийн менежментхүний нөөцийн менежмент
хүний нөөцийн менежмент
 

Ähnlich wie Alexandros Papanikolaou PROmis

X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET Journal
 
How to Audit
How to AuditHow to Audit
How to Auditayousif
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniquesiosrjce
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging wormdeepikareddy123
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging wormdeepikareddy123
 
Malware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemMalware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemCyphort
 
A memory symptom based virus detection approach
A memory symptom based virus detection approachA memory symptom based virus detection approach
A memory symptom based virus detection approachUltraUploader
 
L018118083.new ramya publication (1)
L018118083.new ramya publication (1)L018118083.new ramya publication (1)
L018118083.new ramya publication (1)IOSR Journals
 
Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics IJNSA Journal
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Laura Arrigo
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIRJET Journal
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsAlison Hall
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer VandalismAditya Singh
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 

Ähnlich wie Alexandros Papanikolaou PROmis (20)

X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
 
How to Audit
How to AuditHow to Audit
How to Audit
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
NetWitness
NetWitnessNetWitness
NetWitness
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
 
L017317681
L017317681L017317681
L017317681
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
 
Malware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemMalware Most Wanted: Security Ecosystem
Malware Most Wanted: Security Ecosystem
 
A memory symptom based virus detection approach
A memory symptom based virus detection approachA memory symptom based virus detection approach
A memory symptom based virus detection approach
 
L018118083.new ramya publication (1)
L018118083.new ramya publication (1)L018118083.new ramya publication (1)
L018118083.new ramya publication (1)
 
Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 

Mehr von Ignite_Athens

Louise Wilson myfailtale
Louise Wilson myfailtaleLouise Wilson myfailtale
Louise Wilson myfailtaleIgnite_Athens
 
Carlos Martin Ruiz de Gordejuela
Carlos Martin Ruiz de GordejuelaCarlos Martin Ruiz de Gordejuela
Carlos Martin Ruiz de GordejuelaIgnite_Athens
 
Alexandros Mylopoulos
Alexandros MylopoulosAlexandros Mylopoulos
Alexandros MylopoulosIgnite_Athens
 
Alexandros Costopoulos
Alexandros CostopoulosAlexandros Costopoulos
Alexandros CostopoulosIgnite_Athens
 
Yannis Mavragannis software for and by the public final
Yannis Mavragannis software for and by the public finalYannis Mavragannis software for and by the public final
Yannis Mavragannis software for and by the public finalIgnite_Athens
 
Weendy Katerina Stropionati
Weendy Katerina StropionatiWeendy Katerina Stropionati
Weendy Katerina StropionatiIgnite_Athens
 
Vagos Pterneas touring machine sightseeing reimagined
Vagos Pterneas touring machine sightseeing reimaginedVagos Pterneas touring machine sightseeing reimagined
Vagos Pterneas touring machine sightseeing reimaginedIgnite_Athens
 
Themistoklis Tsoufis the branding of Greek traditional products
Themistoklis Tsoufis the branding of Greek traditional productsThemistoklis Tsoufis the branding of Greek traditional products
Themistoklis Tsoufis the branding of Greek traditional productsIgnite_Athens
 
BuddyTraffic Takis Karalivanos
BuddyTraffic Takis KaralivanosBuddyTraffic Takis Karalivanos
BuddyTraffic Takis KaralivanosIgnite_Athens
 

Mehr von Ignite_Athens (20)

Louise Wilson myfailtale
Louise Wilson myfailtaleLouise Wilson myfailtale
Louise Wilson myfailtale
 
Ydir Vissers
Ydir VissersYdir Vissers
Ydir Vissers
 
Thanasis Prifitis
Thanasis PrifitisThanasis Prifitis
Thanasis Prifitis
 
Lida Tsene
Lida TseneLida Tsene
Lida Tsene
 
Nikos Koutsianas
Nikos Koutsianas Nikos Koutsianas
Nikos Koutsianas
 
Haris Makryniotis
Haris Makryniotis Haris Makryniotis
Haris Makryniotis
 
Fanis Koutouvelis
Fanis KoutouvelisFanis Koutouvelis
Fanis Koutouvelis
 
Elias Spirtounias
Elias SpirtouniasElias Spirtounias
Elias Spirtounias
 
Eleytherios Kosmas
Eleytherios KosmasEleytherios Kosmas
Eleytherios Kosmas
 
Dionysis Kolokotsas
Dionysis KolokotsasDionysis Kolokotsas
Dionysis Kolokotsas
 
Dimitris Tsingos
Dimitris TsingosDimitris Tsingos
Dimitris Tsingos
 
Carlos Martin Ruiz de Gordejuela
Carlos Martin Ruiz de GordejuelaCarlos Martin Ruiz de Gordejuela
Carlos Martin Ruiz de Gordejuela
 
Betty Tsakarestou
Betty TsakarestouBetty Tsakarestou
Betty Tsakarestou
 
Alexandros Mylopoulos
Alexandros MylopoulosAlexandros Mylopoulos
Alexandros Mylopoulos
 
Alexandros Costopoulos
Alexandros CostopoulosAlexandros Costopoulos
Alexandros Costopoulos
 
Yannis Mavragannis software for and by the public final
Yannis Mavragannis software for and by the public finalYannis Mavragannis software for and by the public final
Yannis Mavragannis software for and by the public final
 
Weendy Katerina Stropionati
Weendy Katerina StropionatiWeendy Katerina Stropionati
Weendy Katerina Stropionati
 
Vagos Pterneas touring machine sightseeing reimagined
Vagos Pterneas touring machine sightseeing reimaginedVagos Pterneas touring machine sightseeing reimagined
Vagos Pterneas touring machine sightseeing reimagined
 
Themistoklis Tsoufis the branding of Greek traditional products
Themistoklis Tsoufis the branding of Greek traditional productsThemistoklis Tsoufis the branding of Greek traditional products
Themistoklis Tsoufis the branding of Greek traditional products
 
BuddyTraffic Takis Karalivanos
BuddyTraffic Takis KaralivanosBuddyTraffic Takis Karalivanos
BuddyTraffic Takis Karalivanos
 

Kürzlich hochgeladen

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Alexandros Papanikolaou PROmis

  • 1. PROMIS - a PROactive Malware Identification System Vasileios Vlachos Alexandros Papanikolaou Fotis Liatsis
  • 2. Crowdsourcing crowd·sourc·ing: to utilize (labor, information, etc.) contributed by the general public to (a project), often via the Internet and without compensation Can you guess the exact weight of an ox …or the exact number of the beans in a jar
  • 3. Crowdsourcing Probably none of us could do it right ...but all of us together is another story… Crowdsourcing uses the collective wisdom of the crowds as it collects large amounts of information and aggregates it to gain a complete and accurate picture of a topic, based on the idea that a group of people is often more intelligent than an individual Photo (CC-BY) James Cridland.
  • 4. Crowdsourcing C’mon be serious, who cares about oxen and coffee beans in jars ? Apparently the USS Navy (Dr John Craven was appointed with a group of scientists) to locate the missing USS Scorpion in the Ocean …as well its two nuclear torpedoes. Bow section of the sunken Scorpion containing two nuclear torpedoes on the sea floor. US Navy photo.
  • 5. Crowdsourcing Yeah but that was old time ago ๏ DARPA Network Challenge 2009 Ten red balloons were released in various places in the US and the participants had to get the exact coordinates of the ballons. ๏ Tag Challenge, funded by the US State Department 2012 Three out 5 individuals in 5 different cities were identified and found from volunteers using crowdsourcing New York Washington DC Bratislava Stockholm
  • 6. The Problem: Computer viruses… and worms A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself Code Red 12h Slammmer 10m
  • 7. Computer Viruses The lifecycle of an antivirus signature 1. Collect a suspicious file 2. Analyze the suspicious code 3. Create a virus signature 4. Test the signature to avoid identifying legitimate applications as malware 5. Push the update to the software clients How much time do we need to complete the above steps?
  • 8. PROMIS - a PROactive Malware Identification System ๏ PROMIS is an Early Warning System for rapidly-spreading computer viruses ๏ PROMIS is a small software application which transform a PC in to a sensor ๏ PROMIS needs only to have access to the log file of the security applications (Firewall and AntiVirus), no sensitive data are even read ๏ PROMIS combines the basic concepts of crowdsourcing, biodiversity with epidemiology and public health (after all computer viruses have striking similarities with biological viruses) ๏ PROMIS act preactively in order to protect against unknown threats and buys some time to user and AV vendors to provide signatures, patches and updates
  • 9. The Question: Biodiversity vs Monocultures ๏ Monoculture is the agricultural practice of producing or growing a single crop or plant species over a wide area and for a large number of consecutive years. In the field of computer science, monoculture is a community of computers that all run identical software. All the computer systems in the community have the same vulnerabilities, and, like agricultural monocultures, are subject to catastrophic failure in the event of a successful attack. ๏ This concept is significant when discussing computer security and viruses. In particular, Dan Geer has argued that Microsoft is a monoculture, since a majority of the overall number of computers connected to the Internet are workstations and servers running versions of the Microsoft Windows operating system, many of which are vulnerable to the same attacks. Biodiversity on the hand utilizes different software and hardware architectures provides us with significant and useful information ๏ Monocultures can lead to the quicker spread of diseases but ๏ also keep costs down (economies of scale, standardization etc)
  • 10. The Problem: Computer Viruses If a system isn’t vulnerable then the virus / worm attack is recorded in the Antivirus / Firewall Log File An increase in the rate of attacks might indicate ๏ Technical malfunctioning ๏ A targeted attack ๏ A virus epidemic
  • 11. PROMIS - a PROactive Malware Identification System Locally intercepted PROactive malicious activity k åh n i Malware htn - i= t- k ptn = k k Identification åh n i i= t- k k System Estimation of Internet threa level n åP t i pavg = i=1 n
  • 12. PROMIS - a PROactive Malware Identification System
  • 13. PROMIS - Countermeasures If the threat level exceeds a pre-defined threshold autonomously increase or decrease the security level by • Activating / deactivating useful but not critical services • Increase / decrease the security client of the browser / e-mail client • Enable / disable types of content which are known infection vectors (Flash, Java, VBA, javascript etc) Instead of trying to create vaccines (signatures) for any new unknown computer virus we follow simple public health approaches. Take some basic precautions until the storm weather out (and or a cure or a vaccine is ready)…just like the flow
  • 14. Proof of concept prototypes I Java 1.4 JXTA 1.1 NetBiotic Windows XP Linux Outwit tools
  • 15. Proof of concept prototypes II Windows XP SP1 MSP2P API C#, C++ MSPROMIS ICF Outwit tools
  • 16. Simulation The simulator works fine (output close to the analytical solution) as well some other software tools that we have built
  • 17. Simulation A sufficient number of nodes survives the infection according to the experimental results
  • 18. Conclusions What do we need from you? Your feedback, as well as your help to increase our project’s visibility, because in order to build a crowdsourcing application you know we need….a crowd ! Your ideas about a possible business plan to facilitate the development and support of the platform for sufficient time to attract adequate users
  • 19. Summary Some publications so no patents at all, sorry! ๏ Vasileios Vlachos, and Diomidis Spinellis, A PRoactive Malware Identification System based on the Computer Hygiene Principles, Information Management & Computer Security, 15(4):295–312, 2007. (doi:10.1108/09685220710817815) ๏ Vasileios Vlachos, Stefanos Androutsellis-Theotokis and Diomidis Spinellis, Security Applications of Peer-to-peer Networks, Computer Networks (Elsevier Science), Volume 45, Issue 2, pp 195-205, June 2004. (doi:10.1016/j.comnet.2004.01.002) ๏ Vasileios Vlachos, Andreas Raptis, and Diomidis Spinellis PROMISing steps towards computer hygiene.", In Steven Furnell, editor, International Network Conference (INC2006), pages 229-236, July 2006, Plymouth, UK. Is the outcome of the PhD work of the 1st member under the supervision of Professor Diomidis Spinellis ๏ PhD Thesis, "Security Applications of Peer to Peer Networks", Athens University of Economics and Business (AUEB), Athens, July 2007
  • 20. Summary Our team: Vasileios Vlachos Alexandros Papanikoalou Professor of Technological Researcher Fotis Liatsis Applications Technical University of Crete Undergraduate Student Technological Educational Technological Educational Institute of Larissa Institute of Larissa