Unpredictability as a cyber defense

Researchers are developing Chameleon, which is an operating system (OS) that is designed to run unknown programs that could be malware in a special "unpredictable" environment that intentionally introduces some unpredictability to the way the system operates.

03/01/2016


Sometimes systems running with regularity are too easy for malware to jump in, so what happens when the system shows a sense of disarray?

That is exactly what Daniela Oliveira, a professor in the University of Florida Herbert Wertheim College of Engineering, is thinking of when she says unpredictability could help outsmart malware.

That's the logic behind Chameleon, the operating system (OS) she's developing with colleagues at UF, Stony Brook University and the University of California, Davis.

Chameleon, which is still at the conceptual phase, runs unknown programs that could be malware in a special "unpredictable" environment, where the OS intentionally introduces some unpredictability to the way they operate.

"Even though it seems crazy to impact functionality, it can be very effective at countering attacks if it only impacts software that could be malicious," Oliveira said. "The malicious process thinks it's in control, but it's not."

Programs you know and trust could run in a standard environment where they'll function normally, while detected malware end up sequestered in a third environment, called deceptive. Instead of squashing them immediately, Chameleon would let the malicious processes continue to work in a façade environment while collecting information it could use to understand and defeat them.

Oliveira's inspiration came in part from her interest in military strategy.

"I've read a lot about warfare. Sun Tzu, Julius Caesar—they were successful because of the element of surprise. Cyberwarfare is the same," she said.

Deception has seen use against cyber attacks before, mostly in "honeypot" strategies that lure attackers in to gather information. But those deceptions typically end up quickly revealed, Oliveira said, which limits their effectiveness. What sets Chameleon apart is inconsistent deception: Quarantined software—or malware that bypasses standard detection systems—runs in an unfavorable environment until proven either benign or malicious.

An operating system like Chameleon would be great for a corporate environment, where users know the mission-critical software in advance, Oliveira said. That's good news not just for corporations, but also for those of us who entrust our sensitive data to them.

"Predictable computer systems make life too easy for attackers," she said.

Gregory Hale is the editor and founder of Industrial Safety and Security Source (ISSSource.com), a news and information website covering safety and security issues in the manufacturing automation sector. This content originally appeared on ISSSource.com. Edited by Chris Vavra, production editor, CFE Media, Control Engineeringcvavra@cfemedia.com.

ONLINE extra

See additional stories from ISSSource about cyber security below.



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Robotic safety, collaboration, standards; DCS migration tips; IT/OT convergence; 2017 Control Engineering Salary and Career Survey
Integrated mobility; Artificial intelligence; Predictive motion control; Sensors and control system inputs; Asset Management; Cybersecurity
Big Data and IIoT value; Monitoring Big Data; Robotics safety standards and programming; Learning about PID
Featured articles highlight technologies that enable the Industrial Internet of Things, IIoT-related products and strategies to get data more easily to the user.
This article collection contains several articles on how automation and controls are helping human-machine interface (HMI) hardware and software advance.
This digital report will explore several aspects of how IIoT will transform manufacturing in the coming years.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Mobility as the means to offshore innovation; Preventing another Deepwater Horizon; ROVs as subsea robots; SCADA and the radio spectrum
Future of oil and gas projects; Reservoir models; The importance of SCADA to oil and gas
Big Data and bigger solutions; Tablet technologies; SCADA developments
Automation Engineer; Wood Group
System Integrator; Cross Integrated Systems Group
Jose S. Vasquez, Jr.
Fire & Life Safety Engineer; Technip USA Inc.
This course focuses on climate analysis, appropriateness of cooling system selection, and combining cooling systems.
This course will help identify and reveal electrical hazards and identify the solutions to implementing and maintaining a safe work environment.
This course explains how maintaining power and communication systems through emergency power-generation systems is critical.
click me