Tolerating Viruses In Order To Ignore Them 18
Tammy writes "This article discusses how a new approach to computer security focuses on allowing computers to function even when infected with a virus or worm. This relatively new approach contrasts with traditional, preventitive security that has been sucseptible to numerous attacks."
Passive Resistence (Score:1)
Seems to work... (Score:2)
Big mistake (Score:2)
Keeping computers functioning after infection only serves to increase the propogation of the virus. Successful viruses keep the host healthy enough to aid transmission.
For instance, if word viruses stopped you from opening word, they'd find it difficult to move from host to host. What would be better - an outlook virus that disabled email, or one that couldn't?
Re:Big mistake (Score:1)
But what they're describing here is *theoretically* a technique for preventing DoS attacks... Even though you are under the influence of malicious code, your services are "protected" from going down.
So they're good.
Except:
Their technique is a combination of proxy servers, URLSpy-style query validation, clustered servers, and comparative validation. So:
Firewall (Score:2)
*shrug* move along, nothing to see here.
Re:Firewall (Score:1)
So while examples of each of the 3 sub-systems used in this approach have a existed for a long time, the combination of them in this context is a less well know (possibly new) idea and has merrit.
Kind of silly.. (Score:2)
funny article, but also, redundant (Score:1)
so you are going to help customers porting their key application, and buy the computer/OS, and call this "fault-tolerance "?
SITAR's first line of defense consists of "proxy servers," computers that stand as intermediaries between the protected system and the outside world. T
irony (Score:1)
New? (Score:1)
New approach to handling viruses? My company has left Windows running on thier machines for years... *rimshot*
. . . (long silence). . . (Score:1)
SITAR (Score:1)
Indian stringed instrument: an Indian stringed instrument with a rounded resonating body and a long fretted neck. There are several playing strings and a larger number that vibrate sympathetically. Need I Say More!!!!!!
Virtual PC (Score:2)
Read-only (Score:2)
Clearly the systems that do real work, that need to be protected the most, can not be duplicated. Would work well for DNS/web servers though.
I do not (Score:2)
This article describe the ability of a DDoS'd server to ignore the DoS'ing going on around it with a bunch of funny acronyms. It is not about a program continuing to work even after being infected by a virus, as the
And the article is not terribly informative. You know something is