SUBSCRIBE

Microsoft pitches PC isolation ward to defeat botnets

Microsoft Corp.โ€™s security chief Wednesday pitched a plan that would block some botnet-infected computers from connecting to the Internet.

A noted botnet researcher said the proposal didnโ€™t attack the problem at its root, and like many technical solutions, was unlikely to do much good.

In a paper published Wednesday, Scott Charney, who heads Microsoftโ€™s trustworthy computing group, spelled out a concept of โ€œcollective defenseโ€ that he said was modeled after public health measures like vaccinations and quarantines.

Under Charneyโ€™s proposal, PCs would be issued a โ€œhealth certificateโ€ that showed whether the system was fully patched, that it was running security software and a firewall, and that it was malware-free. Machines with deficiencies would require patching or an antivirus update, while bot-infected PCs might be barred from the Internet.

Quarantining PCs could be a last-step measure, Charney said, to keep compromised PCs from threatening others on the Web.

โ€œJust as when an individual who is not vaccinated puts othersโ€™ health at risk, computers that are not protected or have been compromised with a bot put others at risk and pose a greater threat to society,โ€ Charney argued in a post to aย company blog. โ€œWe need to improve and maintain the health of consumer devices connected to the Internet in order to avoid greater societal risk.โ€

Charney admitted that his proposal would face resistance, such as privacy concerns, over what the health certificate would reveal and whether it would be tied to a specific individual. Even so, he made suggestions likely to raise a ruckus.

โ€œThere may be value in uniquely identifying devices, as when a device may be infected on a home network,โ€ he wrote in his paper, Collective Defense: Applying Public Health Models to the Internet (download PDFย ). โ€œIt may also be possible, of course, to combine device information with other information to identify a user (much like cell phones may have unique identifiers and can be tied to particular account holders).โ€

Charney also said that government intervention would be necessary, another issues the notoriously anti-regulation Internet community may balk at. โ€œVoluntary behavior and market forces are the preferred means to drive action but if those means fail, then governments should ensure these concepts are advanced,โ€ he said.

The bottom line is that current methods to block criminals from infecting consumersโ€™ computers are not working, news that may come as a surprise toย Microsoftย โ€˜s own Malware Protection Center, which regularly touts the success of its Windows Malicious Software Removal Tool, a free program that scrubs infected Windows systems.

โ€œCommonly available cyber defenses such as firewalls, antivirus and automatic updates forย securitypatches can reduce risk, but theyโ€™re not enough,โ€ Charney said. โ€œDespite our best efforts, many consumer computers are host to malware or are part of a botnet.โ€

Botnets are collections of already hijacked computers that criminals use as a force multiplier to send spam, host malware or launch distributed denial-of-service attacks against Web sites. A botnet may consist of only hundreds of individual PCs, more likely thousands, and in rare cases, millions.

Carneyโ€™s ideas are neither new nor untested, as he pointed out in his paper. For example, Comcast, the largest residential Internet service provider in the U.S. with an estimated 16.4 million subscribers, recently announced it would notify customers when it detected a bot on their machines. Comcast will direct infected users to a site that walks them through a malware clean-up chore.

But itโ€™s unlikely Charneyโ€™s ideas will curtail botnets or even pass muster with users, said Joe Stewart, director of malware analysis at Atlanta-based SecureWorks, and a well-known botnet expert.

โ€œIf you donโ€™t address the human behind the botnet, youโ€™ll fail,โ€ Stewart said.

โ€œTechnical solutions just havenโ€™t worked,โ€ Stewart said, referring to Charneyโ€™s health certificate concept. Criminals are simply too adaptable, too clever to be long stymied by any technology-based defense, whether certificates โ€” which even Charney acknowledged would have to be counterfeit-proof โ€” or antivirus software, firewalls and patches.

โ€œPlenty of people get infected by a bot who have all the patches, who have a firewall, who have antivirus,โ€ Stewart said. โ€œThey donโ€™t even know theyโ€™ve been infected.โ€ How, then, would one explain to them that they canโ€™t get on the Internet? he asked.

Instead, more resources should be dedicated to other initiatives. โ€œFirst, we need much better global communication and collaborationโ€ between researchers and law enforcement, he said, as well as an enforceable way to hold ISPs accountable for hosting botnetsโ€™ command-and-control servers, no matter where theyโ€™re located.

โ€œAnd we need more what I call โ€˜offense in depth,’โ€ Stewart added, explaining the strategy as one where researchers and law enforcement agencies hound a botnet until its gang of controllers is driven out of business or arrested.

Stewart has proposed that before. Last April he laid out an anti-botnet approach in which teams of paid security researchers, similar to a police departmentโ€™s major crimes unit, wouldย stalk and disrupt specific criminal gangsย or botnets.

Even if Charneyโ€™s technology-based proposal worked, Stewart was skeptical that people would buy into the idea.

โ€œI just donโ€™t see how you could make it happen with the current paradigm of computing,โ€ said Stewart. People are accustomed to the idea that they can do what they want with their personal computer โ€” put any software on the machine, jump on the Internet at a momentโ€™s notice โ€” and a radical departure from that will have a tough time finding supporters.

The only way to block botnets from getting on PCs is if the PC industry adopted a closed ecosystem, similar toย Appleย โ€˜s App Store, said Stewart, where only certain applications are allowed to be installed.

โ€œBut everything would have to be fundamentally redesigned,โ€ he said. โ€œI donโ€™t think people have reached the point yet with botnets where they would agree to that. Maybe in 20 years. But for now weโ€™re locked into this mentality that we can do anything we want.โ€

Tech Jobs

Categories