‏إظهار الرسائل ذات التسميات Systems. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات Systems. إظهار كافة الرسائل

الاثنين، 18 يونيو 2012

Building a Logic Bomb Bypass System for Our Artificial Intelligent Infrastructure Systems

Over the last year, our think tank has been reviewing the Stuxnet computer worm. Indeed, we've also been reviewing this latest computer virus which is said to be gathering information throughout the Middle East, and running rampant on their computer systems. What happens when a similar computer virus or computer worm is able to infiltrate our infrastructure computer systems here the United States? Did we let the cat out of the bag, did someone else, and how on earth are we going to get that genie back in the bottle? Okay so, let's talk about this for second shall we?

And let's go ahead and spin this topic a bit, and talk about logic bombs, and other challenges that are artificial intelligence systems will have to deal with in the future. Perhaps, they may recognize when there is a problem, and reprogram themselves to bypass their instructions. If they hit a logic bomb, there may be a bypass system, and the artificial intelligent infrastructure computer software will begin to rewrite some of its code from scratch. Yes, to do this, it will have to be thinking machine, or advanced artificial intelligence, but much of the software running these complex systems for instance with our energy grid, or other major infrastructure systems - are using the state-of-the-art AI.

In the human mind there seems to be bypasses that allow for creativity rather than the information flowing down the leafy skeleton of the brain's neural pathways. Maybe such a system should borrow this trick from the organic natural intelligence that all human brains have to solve this problem - bypassing all the logic gates opening and closing due to a virus or computer worm which is set everything into a giant loop. Is it possible to outsmart such a complex computer worm?

With a little creativity, there is no problem that cannot be solved, and maybe the solution is so simple its right under our noses, but we haven't stepped back long enough to philosophically consider the rationale or potential strategies available to us. There is no reason the system cannot jump, skip, or bypass a problem area. If an insect eats part of a leaf, the leaf is still able to get nutrients around the problem area and survive, just as stroke victims are able to reprogram their brain to get to information by going a different way, or using different associations to access their memory.

Is it as simple as I am explain it? No, it's a complex problem, but all complexity starts from simplicity, so it is just a matter of starting out with the right fundamentals before attacking the problem, or becoming overwhelmed with the challenge that has presented itself. Perhaps, it's time to stop and think. Maybe everyone is looking in the wrong direction. Indeed I hope you will please consider all this.

Lance Winslow has launched a new provocative series of eBooks on Internet Security Concepts. Lance Winslow is a retired Founder of a Nationwide Franchise Chain, and now runs the Online Think Tank; http://www.worldthinktank.net/


View the original article here

السبت، 9 يونيو 2012

Host Intrusion Detection Systems

Network Security incidents are becoming a bigger and bigger problem for businesses of all sizes. Recent attacks on large entities such as NASA, Lockheed Martin, RSA, and Google have shown us that no company is completely safe. Managers need to figure out ways to mitigate risks and develop contingency plans for the inevitable break in. There are a variety of tools and systems available, but the one we want to talk about today is the Intrusion Detection System, otherwise known as IDS. The intrusion detection system focuses on detecting malicious activity. By using these tools to recognize when an incident has occurred, administrators are able to respond quickly to take corrective measures.

Malicious users or hackers can get access to an organization's internal systems in various ways, including

Software bugs called vulnerabilitiesLapses in administrationLeaving systems to default configuration

An Intrusion Detection System (IDS) complements firewall security. While the firewall protects an organization from malicious attacks from the Internet, the IDS detects attempts on breaking through a firewall. If someone attempts or manages to break through the firewall security, the system springs into action. It alerts a system administrator, functioning much like a burglar alarm.

There are two main types of Intrusion Detection systems: host based IDS and network based IDS. The host-based sensor is software that runs on the host being protected, monitoring system audit and event logs. When any of these files change, the IDS sensor compares the new log entry with attack signatures to see if there is a match. In case a match is found, the sensor notifies the management console. These sensors do not do any packet level analysis. Instead, they monitor system level activities. For example, the system would detect events such as an unauthorized user (not an administrator) changing registry files in a Windows NT system, changing /etc/password or /etc/shadow file in a Unix system, or a user trying to login late at night when only authorized for normal business hours. These indications are useful for detecting suspicious activities that may indicate a compromise.

The host-based sensors monitor these kinds of activities, responding with administrator alerts when anomalies occur. Host based IDS have grown over the years. Some systems checks key system files and executables via checksums at regular intervals for unexpected changes. Other products listen to port based activity and alert administrators when specific ports are accessed. Each system solution has its own advantages and disadvantages. What is important is that managers determine which solution is correct for their companies.

To learn more, please visit Host-Based IDS


View the original article here