9.jun.2000

CyberlifeI AM LEGION

wormsAt last count the I-Love-You worm (virus) is responsible for billions of dollars worth of damage. The worm was nothing special, but it was sufficiently different to the last e-plague, Melissa, that it sailed past virus scanners and into Windows' e-mail programs everywhere. 

With far more to protect than the average computer user, Sandia National Laboratories are busy training an agent to recognise and kill viruses, worms and other invaders before they do damage. Steve Goldsmith is lead scientist on the project. 

His assessment of his agent's abilities is blunt: "If every node on the Internet was run by one of these agents, the I-Love-You virus would not have got beyond the first machine."
 

cybereyesCyber Agents

The agent isn't a Bond or an Ethan Hunt or even an Übergeek like one of the X-Files' Lone Gunmen. He's... well more like the browser you're using to view this site. The agent is software. You may know these agents as "bots" and if you've spent anytime on the Internet, you've probably already benefited from their actions. The most common bots are the spiders or crawlers, that access Web sites and gather their content for search engine indexes. Bots and software agents differ from conventional software in that they are semi-autonomous. Once given goals, agents can act, react and adapt without supervision. 

The hope is that adaptive agents will combat the biggest problem with current computer security: inflexibility. Ray Parks is leader of Sandia's government and corporate computer defence testing group, government paid hackers known as the Red Team. He puts the problem like this: "New stuff is coming along that you don't even know exists. Your software doesn't recognise it. Current defenses work as virus checkers; they recognise only specific virus patterns." 

In March 2000, Parks and his Red Team attacked a five computer network at Sandia protected by recently developed security bots known as cyberagents. The attack failed. The cyberagents, without outside assistance, held off four, experienced, human hackers for 16 hours.

After the unsuccessful attack, Parks considers the cyberagent a worthy opponent. "It will recognise odd attacks. It will turn off services, close ports, go to alternate means of communication, and tighten firewalls," he explained.
 

agents actionsLicensed To Shut Down

What sets the Sandia cyberagent apart is that, unlike other bots, it is both an individual and a collective. 

The agent runs on multiple computers in a network and depending on circumstances the separate copies of the agent can act alone or together as a single, distributed program. The agents across the network constantly compare notes to determine if any unusual requests or commands have been received from external or internal sources. Their continuous vigilance means the system can recognise a threat by itself rather than waiting for software writer to identify a problem, figure out a defence and put it into a virus checker. 

The agents detect and deal with even the subtlest attacks or information gathering:

  • port scans (which browse through all the net addresses on a computer and check which functions they provide access to) can be picked up even if the scan takes place over a year. 
  • faint probes almost indistinguishable from system noise are picked up and stored, revealing hackers carefully trying to learn enough to take over a network. 
  • sophisticated pattern-recognition system allows the cyberagent to recognise and shut down computers which have been compromised by the installation of trojan Horses: hidden, sleeper programs which can be activated and operated by hostile outsiders. It can also remove from the network computers which have already fallen into the wrong hands. 
  • denial of service attacks which recently shut down the web-side operations of several American corporations have no effect. Cyberagents faced with a runaway barrage of incoming network requests close the gates of the system to prevent it from being flooded. 
  • security functions are integrated with ordinary everyday network use. File transfer, web browsing and e-mail are incorporated into each agent providing intrinsic security to each user.
  • (last but not least) 'live' programs such as the I-Love-You virus are prohibited from entering the e-mail system.

  •  

     
     
     

    shut downNever Send A Human To Do A Machine's Job

    No central authority operates the agent. Instead, decentralised control makes each agent autonomous yet cooperative. So, no single point of attack can bring down the collective. The multi-agent program can also send out probes to locate and assess its attacker. 

    "It's a sophisticated program," says Goldsmith. "For example, it replaces old agents by fresh agents periodically. This ensures that hacked systems are flushed eventually and must be re-hacked to be compromised." In fact it's so sophisticated it's almost life-like. An agent's entire structure is described by a program 'genome.' Download a genome and it grows a new agent from scratch. Once it's born, it connects immediately to other agents and becomes a member of the security community. This virus-like replication makes the agent easy to deploy in large numbers on the Internet... Resistance certainly appears to be futile. 

    The cyberagents' ability to respond quickly when faced with a vast number of attacks and to colonise new territory even more quickly means it's not only an improvement on old virus scanners, in a purely computer security sense, it's an improvement on people.

    "Never send a human to do a machine's job" says Sandia researcher Laurence Phillips. "The cyberagent is a program acting under its own recognisance, and not under the direct control of an operator...Humans aren't fast enough. A person sitting at a terminal cannot protect you from Internet attack that is coming from everywhere in large masses of data."

    Cyberagents need to be faster than human beings because they are designed to go up against far bigger guns than Melissa or I-Love-You. "We're less concerned with the teen-aged kid and more with the serious agents from foreign governments or foreign corporations who may take a long time, very gently probing to understand where computers are that they can take over or compromise," says Goldsmith. "On command, they can be made to act as a supercomputer to attack a target, as happened recently, or crack a privacy code intended to protect financial, medical, or other critical data."
     

    mars swarmTalk to My Agent

    In time the agents may graduate from patrol to control. Intelligent agents would be ideal for the control of interplanetary robot swarm missions while at the same time protecting them from long distance hackers or practical jokers. Closer to home micro-satellite swarms or perhaps even remote-controlled jet fighters could be computer-coordinated with agent assistance. 

    For now the plan is to ready the basic agent for specific applications in business and government by next year. A consumer release is at least three years away as Sandia says the agent must be "trained to protect a wider variety of services" before it can be of much use to the average household. One suspects it also needs to be dumbed down slightly so that it is not quite as clever as the military-grade version.

    Agents in the form of bots are already out there helping consumer get the best prices for on-line goods or collecting sites for search engines, but the speed, stability, and adaptability of these new multi-agents may mean they'll end up replacing these and other programs. 

    Goldsmith believes that, "Interested consumers or businesses could form secure coalitions against hackers, and they will need to. The home computer is going to be connected to the Internet 24 hours a day, seven days a week with high-speed systems like DSL or cable modem. People will become the target of attacks." 

    What kind of attacks with these be? Well if these agents are as good as Sandia says you can bet it won't be long be before the bad guys get some bots of their own and start using them against governments, corporations and the general public. 

    Only time will tell if the development of Sandia's cyberagents just made Cyberspace safer or more dangerous.


 
 
 
 
 

 


Related stories:

Return of the Phantom
MicroSats for Mars
Spies Infilitrate the Valley

Related links:

Sandia National Laboratories
 

[news topics] [any questions] [the gallery] [guest star] [our picks] [wrong]

[search] [mailing list] [the show] [contact] [credits] [legal]
[pda version]


Copyright © 2000 Beyond Online Limited. All rights reserved.
Questions? Problems? Suggestions? [contact us] [view our privacy policy]