{"id":1284,"date":"2004-01-25T00:00:00","date_gmt":"2004-01-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/25\/mutating-software-could-predict-hacker-attacks\/"},"modified":"2021-12-30T11:39:06","modified_gmt":"2021-12-30T11:39:06","slug":"mutating-software-could-predict-hacker-attacks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/25\/mutating-software-could-predict-hacker-attacks\/","title":{"rendered":"Mutating software could predict hacker attacks"},"content":{"rendered":"<p>Novel computer viruses and worms can sweep the world within hours, leaving a trail of devastation, because firewalls and antiviral software work by identifying the telltale signatures of known attacks.  They are useless against anything completely new.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>But now software engineers at Icosystem in Cambridge, Massachusetts, have developed a program that can predict what is coming next by &#8220;evolving&#8221; future hacker and virus attacks based on information from known ones.<\/p>\n<p>The idea would be to generate these novel attack strategies centrally, then remotely update the intrusion-detection software protecting PCs and networks around the world.  It works by mutating the short programs or &#8220;scripts&#8221; that hackers use to invade computers or which they plant on them for later activation.  The result is artificially created hacking routines that security systems could be taught to recognise, allowing them to defend networks against previously unseen attacks.<\/p>\n<p>More info: [url=http:\/\/www.newscientist.com\/news\/news.jsp?id=ns99994588]http:\/\/www.newscientist.com\/news\/news.jsp?id=ns99994588[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1284","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1284"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1284\/revisions"}],"predecessor-version":[{"id":3771,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1284\/revisions\/3771"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}