Feeds

P-cube goes hunting for zombie PCs

Night of the living spam

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

P-Cube, the traffic management firm Cisco agreed to buy for $200m last month, is aiming to tackle the problem of spam at source by detecting and quarantining spam zombie machines.

P-Cube's IP service control platform allows service providers to identify subscribers, classify applications and offer differentiated service performance. The technology makes it easier for telcos to control and manage advanced IP services such as voice-over-IP, interactive gaming, video-on-demand, or P2P traffic. P-Cube has tweaked this technology to help fight one of the principal causes of spam.

A new version of the Engage service application (Engage v2.1) of P-Cube’s Service Control Platform released this week provides ISPs with a tool for network-based detection and protection from spam zombie attacks.

Worms such as MyDoom and Bagle (and Trojans such as Phatbot) surrender the control of infected PCs to hackers. These expanding networks of compromised zombie machines (dubbed 'botnets' by the computer underground) can be used for spam distribution or as platforms for DDoS attacks. By using compromised machines - instead of open mail relays or unscrupulous hosts - spammers can bypass IP address blacklists.

A great deal of spam (between 40 to 80 per cent depending who you ask) originates from spam zombies. The large number of attacking machines makes it difficult to identify the source of a spam zombie-based attack or to take corrective action in real time without causing massive disruption to network operations and legitimate users. P-Cube claims to have licked this problem with technology that is both application and subscriber-aware. This approach allows service provider to identify spam zombie activity from a particular subscriber, block their email transmissions and redirect the infected subscriber to a site where the system can be purged of the zombie infection. Engage can perform these functions without introducing latency into the network, P-Cube claims.

The approach is similar to the detect, isolate and cleanse approach Cisco has taken with its Network Admission Control program. The scheme involves a combination of technology from Cisco and AV vendors to combat the spread of computer worms across corporate networks.

P-Cube's service platform competes with products from companies such as Ellacoya Networks and Sandvine. As the market evolves its likely that traffic management technology will be increasingly brought into play alongside conventional anti-spam filtering in combating the zombie menace. ®

Related stories

Cisco combats network worms
Rise of the Botnets
Telenor takes down 'massive' botnet
Phatbot arrest throws open trade in zombie PCs

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?