Close Menu
    Facebook X (Twitter) Instagram
    SciTechDaily
    • Biology
    • Chemistry
    • Earth
    • Health
    • Physics
    • Science
    • Space
    • Technology
    Facebook X (Twitter) Pinterest YouTube RSS
    SciTechDaily
    Home»Technology»New Method Can Stop Cyberattacks in Less Than a Second
    Technology

    New Method Can Stop Cyberattacks in Less Than a Second

    By Cardiff UniversityJune 20, 20223 Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn WhatsApp Email Reddit
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email Reddit
    Computer Security Concept Illustration
    The method has been shown to completely prevent up to 92% of files on a computer from being corrupted, with an average malicious program being removed in only 0.3 seconds.

    Computers, laptops, and other smart gadgets in our homes could be protected by artificial intelligence that can quickly identify and eliminate malware.

    Cardiff University researchers have developed a new approach for automatically detecting and killing cyberattacks on our laptops, computers, and smart devices in less than a second.

    Using artificial intelligence in a completely new way, the technology has been found to effectively prevent up to 92% of data on a computer from being corrupted, with a piece of malware being wiped out in only 0.3 seconds on average.

    The team published their findings in Security and Communications Networks on December 6th, and say that this is the first demonstration of a method that can both detect and kill malicious software in real-time, which could transform approaches to modern cybersecurity and avoid incidents like the recent WannaCry cyberattack on the NHS in 2017.

    Monitoring Malware Behavior

    The new strategy, developed in collaboration with Airbus, is focused on monitoring and anticipating the behavior of malware, as opposed to more typical antivirus technologies that analyze what a piece of malware looks like. It also utilizes the most recent advances in artificial intelligence and machine learning.

    “Traditional antivirus software will look at the code structure of a piece of malware and say ‘yeah, that looks familiar’,” co-author of the study Professor Pete Burnap explains.

    “But the problem is malware authors will just chop and change the code, so the next day the code looks different and is not detected by the antivirus software. We want to know how a piece of malware behaves so once it starts attacking a system, like opening a port, creating a process, or downloading some data in a particular order, it will leave a fingerprint behind which we can then use to build up a behavioral profile.”

    Predictive Simulations to Halt Attacks

    By training computers to run simulations on specific pieces of malware, it is possible to make a very quick prediction in less than a second of how the malware will behave further down the line.

    Once a piece of software is flagged as malicious the next stage is to wipe it out, which is where the new research comes into play.

    “Once a threat is detected, due to the fast-acting nature of some destructive malware, it is vital to have automated actions to support these detections,” continued Professor Burnap.

    “We were motivated to undertake this work as there was nothing available that could do this kind of automated detecting and killing on a user’s machine in real-time.”

    Existing products, known as endpoint detection and response (EDR), are used to protect end-user devices such as desktops, laptops, and mobile devices and are designed to quickly detect, analyze, block, and contain attacks that are in progress.

    The main problem with these products is that the collected data needs to be sent to administrators in order for a response to be implemented, by which time a piece of malware may already have caused damage.

    To test the new detection method, the team set up a virtual computing environment to represent a group of commonly used laptops, each running up to 35 applications at the same time to simulate normal behavior.

    The AI-based detection method was then tested using thousands of samples of malware.

    Lead author of the study Matilda Rhode, now Head of Innovation and Scouting at Airbus, said: “While we still have some way to go in terms of improving the accuracy of this system before it could be implemented, this is an important step towards an automated real-time detection system that would not only benefit our laptops and computers but also our smart speakers, thermostats, cars, and refrigerators as the ‘Internet of Things’ becomes more prevalent.”

    Reference: “Real-Time Malware Process Detection and Automated Process Killing” by Matilda Rhode, Pete Burnap and Adam Wedgbury, 6 December 2021, Security and Communication Networks.
    DOI: 10.1155/2021/8933681

    Never miss a breakthrough: Join the SciTechDaily newsletter.
    Follow us on Google and Google News.

    Cardiff University Computer Science Computer Technology Cybersecurity Software Virus
    Share. Facebook Twitter Pinterest LinkedIn Email Reddit

    Related Articles

    New Platform Analyzes Big Data to Answer Plain-Language Queries in Minutes

    MIT Researchers Develop a New Way of Managing Memory on Computer Chips

    New Debugging Method Finds 23 Undetected Security Flaws in Popular Web Applications

    New Energy-Friendly Chip Can Perform Powerful AI Tasks

    ‘Chemical Laptop’ Could Be Used to Search for Life Beyond Earth

    “Data Science Machine” Replaces Human Intuition with Algorithms

    New MIT Software Solves Many of SSH’s Problems

    New Programming System Could Help Prevent Information Leaks

    Mathematical Framework Formalizes Loop Perforation Technique

    3 Comments

    1. FB36 on June 20, 2022 3:03 pm

      Malware problems are mostly because basic design of desktop OSs, such as Windows, Linux, MacOs are too old for the internet age!
      They need to be redesigned to work like VM-based smartphone operating systems which have full control over all running apps & so they are always able to detect & stop any bad code!
      In desktop OSs on the other hand, any running code is easily able to escape from OS checks (by exploiting any existing software bug) & run in any way it likes w/o any restriction afterwards!

      Reply
    2. Jason Stevens on June 21, 2022 5:36 am

      This product already exists, It’s called Deep Instinct. (Not affiliated)

      Reply
    3. RW on June 22, 2022 9:02 am

      “have developed a new approach”. Really, nothing new here. This approach has been used for several years now. Just a new kid on the block.

      Reply
    Leave A Reply Cancel Reply

    • Facebook
    • Twitter
    • Pinterest
    • YouTube

    Don't Miss a Discovery

    Subscribe for the Latest in Science & Tech!

    Trending News

    Artificial Sweeteners May Harm Future Generations, Study Suggests

    Splashdown! NASA Artemis II Returns From Record-Breaking Moon Mission

    What If Consciousness Exists Beyond Your Brain

    Scientists Finally Crack the 100-Million-Year Evolutionary Mystery of Squid and Cuttlefish

    Beyond “Safe Levels”: Study Challenges What We Know About Pesticides and Cancer

    Researchers Have Found a Dietary Compound That Increases Longevity

    Scientists Baffled by Bizarre “Living Fossil” From 275 Million Years Ago

    Your IQ at 23 Could Predict Your Wealth at 27, Study Finds

    Follow SciTechDaily
    • Facebook
    • Twitter
    • YouTube
    • Pinterest
    • Newsletter
    • RSS
    SciTech News
    • Biology News
    • Chemistry News
    • Earth News
    • Health News
    • Physics News
    • Science News
    • Space News
    • Technology News
    Recent Posts
    • Why Losing Too Much Fat Can Be Just As Dangerous as Obesity
    • Beef vs. Chicken: Surprising Results From New Prediabetes Study
    • Alzheimer’s Breakthrough: Scientists Discover Key Protein May Prevent Toxic Protein Clumps in the Brain
    • Scientists Discover New Way To Make Protein Shakes Taste Better
    • Scientists Break Optical Limits With Quantum Dot-Powered Nanoscopy
    Copyright © 1998 - 2026 SciTechDaily. All Rights Reserved.
    • Science News
    • About
    • Contact
    • Editorial Board
    • Privacy Policy
    • Terms of Use

    Type above and press Enter to search. Press Esc to cancel.