Spaf On Security

  /     /     /  
Publicated : 22/11/2024   Category : security


Spaf On Security


Internet security pioneer Eugene Spafford talks about why security has struggled even after its first big wake-up call 25 years ago, the Morris worm



He was one of the first computer scientists to dissect the game-changing worm that hit the Internet 25 years ago and took down thousands of computers. Hes also credited for defining software forensics and shaping other security technologies. But Eugene Spaf Spafford says security still isnt taken seriously enough today.

Eugene Spafford, executive director of CERIAS and computer sciences professor at Purdue University
Spafford -- who goes by Spaf -- is the executive director of Purdue Universitys Center for Education and Research in Information Assurance and Security, as well a professor of computer sciences at Purdue. He spoke with Dark Reading senior editor Kelly Jackson Higgins just prior to his keynote address this week at the ISSA International Conference.
Here is an excerpt from that interview:
DR: Next month marks the 25th anniversary of the Morris worm. What lessons did we learn about security from that incident and what did we miss?
Spafford:
Im not sure we learned any more lessons ... most of the things didnt get fixed.
We went from 20 pieces of malware in 1988 to [around] 180 million today ... that certainly is not a situation where anything has gotten better. We have had a number of opportunities where we could have learned lessons and changed the way we do business.
Back then, there really wasnt a security industry. The difficulty there was that vendors didnt really pick up on this as a problem and change the way their software was developed or the way they packaged things.
We had several years of catch-up where we could have made some changes, but it didnt happen ... I remember going to a couple of meetings that had slots from government, academia, and think tanks where we were talking about defenses of firewalls and so on, but nobody was there from the [vendor community]. They didnt show up at AV conferences in the early 90s, either. They were resistant to any discussion with those in the industry trying to contact them about security issues because they didnt think that was their problem.
The point I would make was that by investing in and putting all the attention on firewalls, we were giving up on host security, basically. My point [then] was if we depend on firewalls, once something gets in, the hosts are still vulnerable, but everyone said, No, firewalls were a stopgap measure until the hosts were fixed.
Fast forward: We still depend on firewalls. The [security] situation really isnt any better, and now we have mobile and BYOD.
DR: Worms today are obviously more malicious and destructive than the Morris worm, but that one was a turning point in Internet security. How would you characterize the evolution of worms?
Spafford:
There are hundreds of [worms] active out there now, but we dont hear about them. No one bothers to mention them.
Back in 1988, the worm would have made news no matter what [Robert T. Morris] had done because we had never seen anything like that. Not many people had thought about the potential for anything like that, and we didnt have the tools to analyze [it]. I dont think it was as much what it did as [it was] its timing. There were a few that followed and got named -- Iloveyou, Nimda, CodeRed.
They became more stealthy because after youve shown it can be done, why would you write one? The answer is for criminal intent. Therefore, you wont want to draw attention to it. You want it to be stealthy, to hide, penetrate, and steal information.
A decade or so ago, I was talking with some people, and we concluded that what Morris had done compared with current day was very minor. And, in fact, I joined a group that was trying to get a presidential pardon for him [at that time] because he has a felony on his record [for the worm conviction], and thats probably too severe. But the people we contacted at the White House told us, No way.
DR: How has security regressed or evolved since then?
Spafford:
A lot of it has been on the wrong path.
Security hasnt been taken seriously [enough] at any level or given the amount of resources and attention it should. Instead, the focus [is] on ... patching.
If everything was in balance, we would have people who are trained across the areas and products they are looking at that are designed to be solid and secure. Any breaking of a system would be a largely futile exercise they would nonetheless indulge in as confirmation or assurance.
Instead, we have a marketplace where that is rewarded: Microsoft just gave $100,000 [to a researcher in its bug bounty program]. This is treated as a first line in security defense. The fact that people are able to make that much money and find that many flaws is indication that something is very wrong with the way were building systems.
DR: What about secure development programs like Microsofts?
Spafford:
Its the basic underpinnings of architecture. Microsofts product isnt so much poor quality -- they do a very good job. The Windows kernel has far less flaws than Linux does, which surprises some of the hackers when they hear that. The problem [Microsoft has] is that they maintain software compatibility with old, broken stuff. They have to have a lot of things in place, otherwise third parties and software and hardware might break with their systems. This is one of the reasons they are really pushing hard to discontinue XP support, so they can fix things in newer versions.
We dont run all legacy software out there. You can build a much more secure system, but it would be slower.
That fact is that this decision is being made by everybody that speed is more important than security. Thats implicit. Thats part of the problem -- were in the mind-set of fast and cheap is more important than making it secure.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Spaf On Security