Feeds

Are you serious about security?

Consider anti-reconnaissance tools

Choosing a cloud hosting partner with confidence

Hurwitz & Associates has been running an IT security campaign: "AVID: Anti-Virus Is Dead" for some time. The argument is based on the principle that blacklists of signatures—small files that contain a unique string of bits, or the binary pattern, that identifies all or part of a virus—do not, and cannot, provide adequate protection against viruses. This is because the signature files can only be written once a virus or other form of malicious software program has been identified. When a new malware program is discovered, the race is on to write a signature file for protecting against that virus. It's like putting a plaster on an open wound, rather than taking care not to get cut in the first place.

Signatures provide ineffective defence against malware such as viruses, unless the exact variant of that malware has been seen before and a specific signature has been made available. Nevertheless, signatures are widely used in security applications. They are used extensively by technology vendors offering intrusion detection and prevention systems (IDSs and IPSs). And they don't work there, either.

Many also employ heuristics—the application of experience-derived knowledge based on the way that particular software applications behave. This type of capability is useful since most malicious software applications adhere to some fairly common characteristics. Because of this, they do a better job at catching unknown threats than signatures, but they have the drawback that they can throw up a large proportion of false positives—that is, where a benign application is flagged as malignant.

When hackers try to attack or intrude on a target, they first try to find out as much as they can about that target. They "case the network", looking to gain as much information about their intended victim as possible: the operating system and applications being used, which versions of software are running, what patches have been applied and so on. Armed with this sort of information, a hacker can plan a more effective attack.

Anti-reconnaissance technology

With this in mind, an improved approach is to deploy a perimeter defense system that intercepts penetration testing attacks as they occur, concealing network resources from the hacker and sending back false information. This defense is known as anti-reconnaissance technology.

To quote Sun Tzu, "All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near."

Anti-reconnaissance technology takes this principle and applies it to protection of the network. There are only so many reconnaissance tools that can be used to scan a network, such as port scans or BIOS probes, so such probes are relatively easy to identify. Anti-reconnaissance technology works by placing a virtual server in front of the network, intercepting all reconnaissance traffic and responding to attacks on behalf of the network. In this way, the hacker is fed seemingly real data, so they are fooled into believing that the real network is responding, rather than a virtual server that is shielding the network.

Arxceo

Technology vendor Arxceo Corporation, a pioneer in this space, provides anti-reconnaissance appliances that sit in front of network devices, obfuscating the real network and sending responses back to an attacker so that they think they have managed to hit a real network, or dropping attacks into "black holes". For example, a common exploit used by a hacker is a SYN (synchronization) scan, which is used to determine which ports are open on a network. A hacker does this by sending a SYN packet to every port on the server. If the server sends back a SYN/ACK (synchronization acknowledgment) packet from a particular port, the hacker will believe that the port in question is open and can therefore be attacked. By sending multiple SYN packets to the server, a server can quickly become overwhelmed and a denial of service attack can be achieved.

Beginner's guide to SSL certificates

More from The Register

next story
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
Kill off SSL 3.0 NOW: HTTPS savaged by vicious POODLE
Pull it out ASAP, it is SWISS CHEESE
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.