Stopping Computer Viruses Before They Reach You

from the is-this-that-big-of-a-deal? dept

Roland Piquepaille writes “The Washington University in St. Louis (WUSL) announced that one of its computer science teams has developed a new technology to stop computer viruses and worms before they reach your system. John Lockwood and his team didn’t use software. Instead, they created an open platform that augments a network with reprogrammable hardware, called the Field-programmable Port Extender (FPX). “The FPX can scan each and every byte of every data packet transmitted through a network at a rate of 2.4 billion bits per second. In other words, the FPX could scan every word in the entire works of Shakespeare in about 1/60th of a second,” said Lockwood. Real products based on the technology should appear soon. More excerpts and references are contained in my blog which also includes a photograph of an FPX module.” I’m a little confused as to what the big deal is about this. It’s basically doing two things: put antivirus protection at the network level instead of the end client, which isn’t a new idea at all and using an FPGA hardware solution instead of software (which they seem to be saying is faster). Am I missing something, or is this not that big of a deal?


Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Stopping Computer Viruses Before They Reach You”

Subscribe: RSS Leave a comment
5 Comments
Anonymous Coward says:

One problem:

zero day worms

How the hell are your going to scan traffic if you don’t know what to fscking look for.

All it takes is one worm that isn’t stupid about how it discovers adjacent hosts (how about using netbios/another “native” microsoft protocol instead ICMP?) and uses a polymorphic intrusion process (no need to fill that buffer up with the same thing over and over again).

…15 minutes later, while the admin is still typing content into their nifty filter, you’re entire network is wormed.

This sounds like a really weak technology that only fixes the current state of the art problems.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...