The SwitchWare Project
Active Network Research at Penn and Bellcore
Active networks explore the idea of allowing routing elements
to be extensively programmed by the packets passing through them. This
allows computation previously possible only at endpoints to be carried
out within the network itself, thus enabling optimizations and extensions
of current protocols as well as the development of fundamentally new protocols.
Welcome to the SwitchWare home page, describing the Active Networks research
effort underway in the Penn Department
of Computer and Information Science and Bellcore
as well as pointers to related material.
The SwitchWare Project - 0 views
Technology Review: Mapping the Malicious Web - 0 views
-
-
Now a researcher at Websense, a security firm based in San Diego, has developed a way to monitor such malicious activity automatically. Speaking at the RSA Security Conference in San Francisco last week, Stephan Chenette, a principal security researcher at Websense, detailed an experimental system that crawls the Web, identifying the source of content embedded in Web pages and determining whether any code on a site is acting maliciously. Chenette's software, called FireShark, creates a map of interconnected websites and highlights potentially malicious content. Every day, the software maps the connections between nearly a million websites and the servers that provide content to those sites. "When you graph multiple sites, you can see their communities of content," Chenette says. While some of the content hubs that connect different communities could be legitimate--such as the servers that provide ads to many different sites--other sources of content could indicate that an attacker is serving up malicious code, he says. According to a study published by Websense, online attackers' use of legitimate sites to spread malicious software has increased 225 percent over the past year.
-
Over the past couple of years, cybercriminals have increasingly focused on finding ways to inject malicious code into legitimate websites. Typically they've done this by embedding code in an editable part of a page and using this code to serve up harmful content from another part of the Web. But this activity can be difficult to spot because websites also increasingly pull in legitimate content, such as ads, videos, or snippets of code, from outside sites.
‹ Previous
21 - 24 of 24
Showing 20▼ items per page