Center for Strategic Assessment and forecasts

Autonomous non-profit organization

Home / Defence and security / / Articles
Possible directions of improving the offensive information weapons
Material posted: -Publication date: 10-07-2001

Revision of the basic directions of development of information security systems provoked a reaction on the part of developers means offensive information weapons or means of special software and mathematical impact.

First of all, it influenced the revision of the foundations of tactics of conducting combat actions information.

Given that modern computer networks have considerable structural stability, the emphasis is on practicing the conduct of massive information attacks aimed at disrupting the normal functioning of computer networks, by blocking access to information resources.

Successful implementation of this approach contributes to two circumstances:

  • the mass distribution of corporate email (MS Outlook, Lotus Notes), which has a number of drawbacks;
  • the mass distribution systems to control the operation of networks (HP Open View, etc.), control algorithms in which threads, also have serious shortcomings.

Examples of successful attacks using the vulnerabilities of the programs listed above can serve as the events associated with the spread of the Melissa virus, when a few days were paralyzed e-mail systems of many companies.

Unfortunately, the problem of macro viruses (to which belongs and Melissa) are currently not resolved.

Today already developed a number of algorithms allowing to write viruses, which fundamentally cannot be detected by any existing methods either today or in the near future.

A number of specialists noted[1]that the virus is written in a virtual machine, is very time-consuming to analyze with traditional methods. If such viruses spread, it is unlikely that the existing anti-virus industry can effectively combat them. It is quite natural. The virus sooner or later had to become more complicated to the extent that when a few professionals with the help of “manual” analysis is nothing you can do.

Along with the problem of massive attacks from macro viruses and e-mail systems, recently received publicity information about the works in the field of creation of “cybernetic organisms”.

This is a small (50 to 100 lines of code) of programs that are automatically generated by special software using genetic algorithms optimization, to minimize long code. The implementation of such a program in the automated system of air traffic control will allow to paralyse major aviation hub in just a few tens of minutes.

The program for the development of the SPMS of this type has received the name of CVCM (Computer Virus Countermeasures).

The most promising way of implementing such programmes is the remote method implementation. If you implement this method, you use the remote defeat of the automated system by hovering over her virus by using a directional electromagnetic field, the modulated code of the virus.

In a number of information sources associated with the prospective satellite communication system Teledesic, see "service attachment", which can be seen as this kind of "cybernetic organism".

Another direction in the improvement of information weapons is the creation of a network of intelligent software agents, which are usually tasked with providing information weapons. One such development is the GenPage and Genetix[2], [3]. System such software agents form the basis for the formation of virtual architecture joint intelligence (Joint Intelligence Virtual Architecture, JIVA).



[1] Chris Kasperski “Viruses: yesterday, today, tomorrow” // BYTE Russia, No. 6(10) 1999, pp. 52-55.

[2] GenePage from Steinkrug Publications http://www.steinkrug.com

[3] ComputerWorld №8 (121), 10 March 1998.


RELATED MATERIALS: Defence and security
Возрастное ограничение