Appraising Cyber Threat posed by More Intelligent, More Imaginative, and more Numerous Attackers. Appraising Cyber Threat when specifying all plausible threat scenarios is impractical.

[HOME]

Underrated US Cyber Threats

Cyber Security Strategic Deficiencies

Network Disinfection (BiPSA)

As smart as hackers are they can't completely undo their idiosyncratic behavior. They don't behave on the network as bona fide surfers behave, and all that we need to do is to discern their pattern, which we do by emulation.

Playing the role of malicious hackers we copy files, we subvert code, we hide data, falsify, erase, and exploit resources. As we do so, we train our installed neural network (BiPSA) to distinguish between normal users and malicious abusers. Like the immune system in our body, trained with vaccines, in order to kill the invading disease, so BiPSA learns to identify malware through our malware emulation, and then identify the malicious attacker with remarkable fidelity.

BiPSA, was originally developed by Prof. Gideon Samid in his PhD dissertation at the Technion -- Israel Institute of Technology. It is an inference engine in which the inferential conclusion is based on an adaptable neural-like network that improves with use.

BiPSA flags suspicious users that warrant further attention.



Security, and everything we do to promote, build, and enhance it, is driven by one and only one factor: the threat. Should your attacker bring to the battle more imagination than you, then he might imagine an attack scenario that you did not have the imagination to conceive, and hence defend against.

The cyber war is therefore a race of imagination. From all the possible ways in which your security could be compromised, the attacker needs to identify only one that you failed to defend against. Since you cannot identify and specify all such attack scenarios, you are well advised to respond with abstraction of the threat: rating the degree of a threat without fully specifying how the threat will materialize. One can then put forth defenses which are reasoned to be helpful, even without detailed specification.

Case in Point: infiltration and data theft was dramatically reduced after a client has periodically (automatically) rewritten software with no material, only cosmetic changes, like renaming variables, and throwing in random comments. The hackers, in ways that remain a mystery, apparently replaced parts of the original code with malware. The introduced changes defanged the attacks.

Threat Abstraction is an emerging security strategy that is not easy to adopt. Come to think about it, abstraction is more effective (not to speak of much less expensive) than White Hat Hacking. Since the latter simply cast the imagination of the White Hats against the imagination of the Black Hats. The latter are at the battlefield for much longer, and for a much greater reward. And besides, the slightest upgrade or modification in any relevant piece of software requires a new White Hat examination, while the Threat Abstraction Analysis is much less volatile.

Threat Abstraction sounds very, shall we say: abstract; so just invite us to conduct an AbstracThreat analysis of your security threats. For many qualified clients we offer no-risk guarantee. If you decide to implement none of our recommendations, the analysis is free. Write to me, Gideon Samid.




www.AGSgo.com 17 Meir Ya'ari Street Tel-Aviv 69371 Israel +972-544-200-400
Rockville MD 20850 * USA Nancy@AGSencryptions.com